US20100122083A1 - Method and apparatus for securely communicating personal health information - Google Patents
Method and apparatus for securely communicating personal health information Download PDFInfo
- Publication number
- US20100122083A1 US20100122083A1 US12/613,040 US61304009A US2010122083A1 US 20100122083 A1 US20100122083 A1 US 20100122083A1 US 61304009 A US61304009 A US 61304009A US 2010122083 A1 US2010122083 A1 US 2010122083A1
- Authority
- US
- United States
- Prior art keywords
- key
- health care
- user terminal
- information
- care server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/0002—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network
- A61B5/0015—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network characterised by features of the telemetry system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H80/00—ICT specially adapted for facilitating communication between medical practitioners or patients, e.g. for collaborative diagnosis, therapy or health monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/88—Medical equipments
Definitions
- One or more embodiments relate to a method and apparatus for securely communicating personal health information.
- HIPAA Health Insurance Portability and Accountability Act
- a method and apparatus for secure communication in which an encryption key and a decryption key are safely distributed and a user's health information is safely transmitted and received.
- a computer-readable recording medium having recorded thereon a program for executing the method on a computer.
- the method includes receiving an encryption key from a security key issuing device through a local communication between a user terminal and the security key issuing device, obtaining health information of a user, encrypting the health information by using the encryption key, and transmitting the encrypted health information to a health care server through a network communication between the user terminal and the health care server.
- the method includes receiving a decryption key from a security key issuing device through a local communication between a health care server and the security key issuing device, receiving encrypted information through a network communication between the health care server and a user terminal, and decrypting the encrypted information by using the decryption key.
- the method includes transmitting an encryption key and a decryption key, which are issued by a security key issuing device to a user terminal and a health care server, encrypting health information of a user by using the encryption key, wherein the encrypting is performed in the user terminal, adding a unique identifier of the user to the encrypted health information; transmitting the unique identifier to the health care server through a network communication, decrypting the unique identifier by using the decryption key, wherein the decrypting is performed in the health care server; and recognizing personal information of the user by using the unique identifier.
- a computer-readable recording medium having recorded thereon a program for executing a method of securely communicating personal health information.
- a user terminal including a health information obtaining unit for obtaining health information of a user, a local communicating unit, which receives an encryption key through a local communication between a user terminal and a security key issuing device, a security key obtaining unit, which obtains the encryption key, an encrypting unit, which encrypts the health information by using the encryption key, and a network communicating unit, which transmits the encrypted health information to a health care server through a network communication.
- a health care server system including a local communicating unit, which receives a decryption key through a local communication between a health care server and a security key issuing device, a security key obtaining unit, which obtains the decryption key, a network communicating unit, which receives encrypted information from a user terminal through a network communication, and a decrypting unit, which decrypts the encrypted information by using the decryption key.
- the security key issuing device includes a security key issuing unit, which issues at least one of an encryption key and a decryption key in response to a request from a healthcare service provider or a user, a security key storage unit, which stores the encryption key and the decryption key together with user information of a user terminal, and a security key transmitting unit, which transmits the encryption key and the decryption key to the user terminal and a health care server through a local communication.
- FIG. 1 is a flowchart illustrating an exemplary embodiment of a secure communication environment for personal health information
- FIG. 2 is a flowchart illustrating an exemplary embodiment of a structure of a secure communication system for personal health information
- FIG. 3 is a flowchart illustrating an exemplary embodiment of a data flow in a security managing unit of a user terminal, which is illustrated in FIG. 2 , when public key cryptography is used;
- FIG. 4 is a flowchart illustrating an exemplary embodiment of a data flow in the security managing unit of the user terminal illustrated in FIG. 2 when secret key cryptography is used;
- FIG. 5 is a flowchart illustrating an exemplary embodiment of mapping tables of a storage unit illustrated in FIG. 2 ;
- FIG. 6 is a flowchart illustrating an exemplary embodiment of a data flow in secure communication of the user terminal with a health care server when public key cryptography is used;
- FIG. 7 is a flowchart illustrating an exemplary embodiment of a data flow in secure communication of the user terminal with the health care server when secret key cryptography is used;
- FIG. 8 is a flowchart illustrating an exemplary embodiment of a method of analyzing a user's health information by an information analyzing unit
- FIG. 9 illustrates an exemplary embodiment of a data flow in security managing units, which use a reinforced version of a selected cryptographic system.
- FIG. 10 is a flowchart illustrating an exemplary embodiment of a method of securely communicating personal health information.
- first, second, third etc. may be used herein to describe various elements, components, regions, layers and/or sections, these elements, components, regions, layers and/or sections should not be limited by these terms. These terms are only used to distinguish one element, component, region, layer or section from another element, component, region, layer or section. Thus, a first element, component, region, layer or section discussed below could be termed a second element, component, region, layer or section without departing from the teachings of the present invention.
- relative terms such as “lower” or “bottom” and “upper” or “top,” may be used herein to describe one element's relationship to other elements as illustrated in the Figures. It will be understood that relative terms are intended to encompass different orientations of the device in addition to the orientation depicted in the Figures. For example, if the device in one of the figures is turned over, elements described as being on the “lower” side of other elements would then be oriented on “upper” sides of the other elements. The exemplary term “lower,” can therefore, encompasses both an orientation of “lower” and “upper,” depending on the particular orientation of the figure.
- FIG. 1 is a flowchart illustrating an exemplary embodiment of a secure communication environment for personal health information.
- the secure communication environment for personal health information includes a user terminal 1 , a health care server 2 , a security key issuing device 3 and a biological signal measuring device 5 .
- the security key issuing device 3 issues and then transmits an encryption key and a decryption key to the user terminal 1 and the health care server 2 through a local communication.
- a user 6 measures a health state by using the biological signal measuring device 5 and the user terminal 1 obtains health information of the user 6 .
- the user terminal 1 and the health care server 2 communicate over a network 4 , and the health information of the user 6 is transmitted in an encrypted state to maintain security.
- a healthcare service provider 7 recognizes the health information of the user 6 by using the health care server 2 .
- the health care server 2 and the security key issuing device 3 are separate devices. In another embodiment the health care server 2 and the security key issuing device 3 may be integrated into one device. For example, functions of the security key issuing device 3 may be included into the health care server 2 .
- the biological signal measuring device 5 and the user terminal 1 are separate devices. In another embodiment, the biological signal measuring device 5 and the user terminal 1 may be integrated into one device. For example, functions of the user terminal 1 may be included in the biological signal measuring device 5 .
- FIG. 2 is a flowchart illustrating an exemplary embodiment of a structure of a secure communication system for personal health information.
- the biological signal measuring device 5 refers to a medical device and equipment for measuring a biological signal of the user 6 .
- the biological signal measuring device 5 may be an electroencephalograph, a brain wave analysis system, a retinal electrometer, a sphygmograph, a tocomonitor, a thermography, a slit lamp microscope, an anthropometer, a phonocardiograph, an electrocardiograph, a thermometer, a body weight scale, an ultrasonic blood flow meter, a hemadynamometer, a blood sugar monitor, a spirometer, or the like or a combination thereof.
- the biological signal may be brain wave analysis data, an electromyogram, a body temperature, a blood pressure value, a body weight, an obesity index, a body fat mass, a liver value, a cholesterol value, a blood sugar value, or the like or a combination thereof.
- the biological signal may include any value, state, or symptom related to health, and the biological signal measuring device 5 may include any device or equipment for recognizing the biological signal.
- the user terminal 1 includes a health information obtaining unit 11 , a security managing unit 12 , a communicating unit 13 , an identifier adding unit 14 , an information displaying unit 15 , and a storage unit 16 .
- the health information obtaining unit 11 obtains health information of the user 6 from the biological signal measuring device 5 .
- the health information of the user 6 may be obtained in at least one of two ways: by input from the user 6 or by direct input based on the biological signal measuring device 5 and the user terminal 1 .
- the way to obtain the health information of the user 6 may be selected by the user 6 or the healthcare service provider 7 .
- the biological signal measuring device 5 is a thermometer
- the health information obtaining unit 11 obtains body temperature information of the user 6 , which is measured by the thermometer.
- the obtaining of the body temperature information may be achieved by input of a body temperature measured by the thermometer from the user 6 or by direct input of the body temperature measured by the thermometer to the health information obtaining unit 11 .
- the user terminal 1 may be linked to the biological signal measuring device 5 or may include a function of the biological signal measuring device 5 .
- the security managing unit 12 includes a security key obtaining unit 121 , an encrypting unit 122 and a decrypting unit 123 .
- the security key obtaining unit 121 obtains an encryption key and a decryption key issued by the security key issuing device 3 .
- the encryption key is used to encrypt the health information of the user 6
- the decryption key is used to decrypt encrypted information transmitted from the healthcare service provider 7 or the health care server 2 .
- public key cryptography and secret key cryptography may be used.
- Public key cryptography is also referred to as asymmetric cryptography or public key/private key cryptography.
- Secret key cryptography is also referred to as symmetric cryptography.
- an encryption key may include at least one of a public key and a secret key and a decryption key may include at least one of a private key and a secret key.
- the type of cryptographic system may be selected according to a selection of the user 6 or the healthcare service provider 7 and a suitable encryption key and decryption key are obtained according to the selected type.
- the security key obtaining unit 121 obtains an encryption key and a decryption key from a local communicating unit 131 or reads them from a portable storage medium. More specifically, if the encryption key and the decryption key are transmitted over a local network between the user terminal 1 and the security key issuing device 3 , the security key obtaining unit 121 obtains the encryption key and the decryption key from the local communicating unit 131 . If the encryption key and the decryption key are transmitted from the user 6 or the healthcare service provider 7 and stored in a portable storage medium, the security key obtaining unit 121 reads the encryption key and the decryption key stored in the portable storage medium.
- the portable storage medium may include a computer-readable recording medium, which is portable.
- Examples of the computer-readable recording medium include magnetic storage media, e.g., read-only memory (“ROM”), a floppy disk, a hard disk and the like, and optical reading media, e.g., a compact disk read only memory (“CD-ROM”), a digital versatile disk (“DVD”) and the like.
- ROM read-only memory
- CD-ROM compact disk read only memory
- DVD digital versatile disk
- the healthcare service provider 7 issues and distributes an encryption key and a decryption key to the health care server 2 of the healthcare service provider 7 and the user terminal 1 to be delivered to the user 6 by using the security key issuing device 3 .
- the distributed encryption key and decryption key are kept in a security key obtaining unit 121 of the user terminal 1 and a security key obtaining unit 221 of the health care server 2 .
- the encryption key and the decryption key are transmitted while stored in a portable storage medium, at least one of an encryption key and a decryption key issued by a security key issuing unit 31 is recorded by a security key recording unit 34 onto the portable storage medium, which may be connected to the security key issuing device 3 .
- the portable storage medium while connected to the user terminal 1 , may read a stored encryption key or a stored decryption key by using the local communicating unit 131 of the user terminal 1 , and the security key obtaining unit 121 of the user terminal 1 may read the encryption key or the decryption key.
- a security key may be issued over a network, such as the Internet.
- a security problem may occur when the issued security key is distributed over the Internet.
- the security key can be safely distributed.
- information is transmitted between parties based on prior agreement of expressions of intention, such as a contract, making it possible to skip a separate authentication process.
- a process of issuing and distributing an encryption key and a decryption key by the security key issuing device 3 and obtaining the encryption key and the decryption key by the security key obtaining unit 121 may be included in a process of manufacturing the user terminal 1 and the health care server 2 .
- the encrypting unit 122 encrypts health information obtained from the health information obtaining unit 11 by using an encryption key obtained from the security key obtaining unit 121 in a selected cryptographic system.
- the encrypting unit 122 converts the health information of the user 6 into a format in which the meaning of the health information cannot be determined without description.
- the selected cryptographic system for executing encryption may be one of public key cryptography and secret key cryptography.
- public key cryptography is used for encryption, the encryption key is a public key of a receiver, i.e., the health care server 2 .
- secret key cryptography is used for encryption, the encryption key is a secret key.
- the decrypting unit 123 decrypts encrypted information obtained from the network communicating unit 132 by using a decryption key obtained from the security key obtaining unit 121 in the selected cryptographic system. In other words, the decrypting unit 123 restores the encrypted information transmitted from the health care server 2 to original information before decryption by using the decryption key.
- the decryption key is a private key of the user terminal 1 .
- secret key cryptography is used, the decryption key is a secret key.
- FIGS. 3 and 4 are flow charts illustrating an exemplary embodiment of data flow in the first security managing unit 12 , which is illustrated in FIG. 1 .
- FIG. 3 is a flowchart illustrating an exemplary embodiment of a data flow in the first security managing unit 12 of the user terminal 1 , which is illustrated in FIG. 2 , when public key cryptography is used.
- the encrypting unit 122 encrypts health information 1221 of the user 6 obtained from the health information obtaining unit 11 with an encryption algorithm 1222 a , which uses a public key 1211 of the health care server 2 obtained by the security key obtaining unit 121 .
- the health information 1221 of the user 6 is converted to encrypted information 1223 using the encryption algorithm 1222 a.
- the decrypting unit 123 when receiving information encrypted in the health care server 2 , decrypts encrypted information 1233 obtained from the network communicating unit 132 with a decryption algorithm 1232 a , which uses a private key 1212 of the user terminal 1 obtained by the security key obtaining unit 121 .
- the encrypted information 1233 transmitted from the health care server 2 is restored to decrypted information 1231 using decryption algorithm 1232 a , thereby restoring original information, which the health care server 2 transmits.
- FIG. 4 is a flowchart illustrating an exemplary embodiment of a data flow in the first security managing unit 12 of the user terminal 1 , which is illustrated in FIG. 2 , when secret key cryptography is used.
- the encrypting unit 122 encrypts health information 1221 of the user 6 obtained from the health information obtaining unit 11 using an encryption algorithm 1222 b , which uses a secret key 1213 of the security key obtaining unit 121 .
- the health information 1221 of the user 6 is converted into encrypted information 1223 using the encryption algorithm 1222 b.
- the decrypting unit 123 after receiving information encrypted in the health care server 2 , decrypts encrypted information 1233 obtained from the network communicating unit 132 , with a decryption algorithm 1232 b which uses a secret key 1213 of the security key obtaining unit 121 .
- the encrypted information 1233 transmitted from the health care server 2 is restored to decrypted information 1231 using the third decryption algorithm 1232 b , thereby restoring original information, which the health care server 2 transmits.
- the encryption algorithm 1222 a and the decryption algorithm 1232 a are commercially available algorithms used in public key cryptography and the encryption algorithm 1222 b and the decryption algorithm 1232 b are commercially available algorithms used in secret key cryptography.
- a security key which hereinafter will collectively refer to an encryption key and a decryption key, is selected according to a type of selected cryptography system.
- the encryption key is a public key of the health care server 2 and the decryption key is a private key of the user terminal 1 .
- secret key cryptography is used for encryption, the encryption key and the decryption key are secret keys.
- the encryption key may includes a document, a device, an instrument and a related technique, and may be used as a single unit for converting information into a format in which the meaning of the information cannot be determined without decryption
- the decryption key may include a document, a device, an instrument and a related technique, and may used as a single unit for restoring information, which has been converted into a format in which the meaning of the information cannot be determined without decryption, to original information.
- the meaning of security management of the security managing unit 22 includes all functions, methods, and systems for protecting a communication network and system and application services from unauthorized access.
- the identifier adding unit 14 adds a unique identifier of the user terminal 1 to encrypted information being output from the encrypting unit 122 .
- the identifier may be a symbol or a set of symbols used to indicate characteristics of the user terminal 1 .
- the health care server 2 may be identified by the unique identifier of the user terminal 1 as the particular user terminal 1 among a plurality of health user terminals communicating with the health care server 2 .
- the identifier may include a symbol or a set of symbols, such as a device serial number of the user terminal 1 , which is based on a contract made between the user 6 and the healthcare service provider 7 .
- the identifier adding unit 14 adds the unique identifier 000 of the user terminal 1 to encrypted information encrypted by the encrypting unit 122 and transmits the addition result to the health care server 2 through the network communicating unit 132 .
- encrypted health information and an identifier are transmitted, whereas a user's personal information is not transmitted.
- secure communication is possible in which high-level security is substantially guaranteed by protecting a user's privacy because user's personal information is not included in the transmitted personal health information.
- the communicating unit 13 includes the local communicating unit 131 and the network communicating unit 132 .
- the local communicating unit 131 transmits the encryption key and the decryption key issued by the security key issuing device 3 to the security key obtaining unit 121 of the user terminal 1 by using local communication.
- the security key may be distributed to the security key obtaining unit 121 of the user terminal 1 by using a local network or by recording the security key onto a portable storage medium.
- the encryption key and the decryption key issued by the security key issuing unit 31 of the security key issuing device 3 are stored in a security key storage unit 32 , together with personal information of the user 6 .
- the encryption key and the decryption key are transmitted by a security key transmitting unit 33 to the security key obtaining unit 121 through the local communicating unit 131 .
- the portable storage medium includes any portable computer-readable recording medium. Examples of the computer-readable recording medium include magnetic storage media, e.g., ROM, a floppy disk, a hard disk and the like, and optical reading media, e.g., a CD-ROM, a DVD and the like.
- a process of issuing the encryption key and the decryption key and transmitting them to the user terminal 1 and the health care server 2 by the security key issuing device 3 may be included in a process of manufacturing the user terminal 1 and the health care server 2 .
- the network communicating unit 132 transmits a result of adding an identifier to information encrypted by the encrypting unit 122 by the identifier adding unit 14 to the health care server 2 through the network 4 , or receives and outputs information transmitted from the health care server 2 to the decrypting unit 123 .
- the network 4 may be generally the Internet, but may also be another type of network such as a wireless local area network (“WLAN”).
- WLAN wireless local area network
- the information displaying unit 15 displays a measurement result of a biological signal of the user 6 and information received from the health care server 2 .
- the information displaying unit 15 may include a device for displaying visual information, e.g., a display, a liquid crystal display (“LCD”) screen, a light emitting diode (“LED”), a scale display device or the like and a device for displaying auditory information, e.g., a speaker or the like.
- a device for displaying visual information e.g., a display, a liquid crystal display (“LCD”) screen, a light emitting diode (“LED”), a scale display device or the like
- a device for displaying auditory information e.g., a speaker or the like.
- the storage unit 16 stores the measurement result of the biological signal of the user 6 and the information received from the health care server 2 . Whether to store the measurement result and the received information is selected by a selection of the user 6 . In other words, the user 6 may control the user terminal 1 to store desired information.
- the health care server 2 includes a communicating unit 21 , a security managing unit 22 , an identifier analyzing unit 23 , a storage unit 24 and an information analyzing unit 25 .
- the health care server 2 may be a server, which stores, analyzes and provides information related to the health of the user 6 .
- health care includes all actions to be made in pursuit of maintaining and promoting health and preventing disease.
- the communicating unit 21 includes a local communicating unit 211 and a network communicating unit 212 .
- the local communicating unit 211 transmits at least one of an encryption key and a decryption key issued by the security key issuing device 3 to the security key obtaining unit 221 of the health care server 2 through local communication.
- a local network may be used, or an issued security key may be recorded onto a portable storage medium and then distributed to the security key obtaining unit 221 of the health care server 2 by using the portable storage medium.
- the portable storage medium may be a portable computer-readable recording medium. Examples of the computer-readable recording medium include magnetic storage media, e.g., ROM, a floppy disk, a hard disk and the like, and optical reading media, e.g., a CD-ROM, a DVD and the like.
- the network communicating unit 212 outputs information received through the network 4 to a decrypting unit 223 through the identifier analyzing unit 23 , or transmits information encrypted by an encrypting unit 222 to the user terminal 1 through the network 4 .
- the network 4 may be generally the Internet, but may also be another type of network such as a wireless local area network (“WLAN”).
- WLAN wireless local area network
- the identifier analyzing unit 23 recognizes the user 6 of the user terminal 1 which transmits the information by referring to a mapping table 241 of the storage unit 24 and controls the security key obtaining unit 221 to use an encryption key and a decryption key that are previously agreed with the user terminal 1 .
- FIG. 5 illustrates mapping tables of the storage unit 24 illustrated in FIG. 2 .
- the information received from the network communicating unit 212 includes the identifier 000 and encrypted information.
- the identifier analyzing unit 23 recognizes that a user identification (“ID”) corresponding to the identifier 000 is a particular value, for example “A” in mapping table 1 , by referring to a first mapping table 241 .
- the identifier analyzing unit 23 also controls the security key obtaining unit 221 to use an encryption key and a decryption key that are previously agreed with the particular user, for example “A”.
- the security managing unit 22 includes the security key obtaining unit 221 , the encrypting unit 222 , and the decrypting unit 223 .
- the security key obtaining unit 221 obtains an encryption key and a decryption key issued by the security key issuing device 3 .
- the encryption key encrypts information to be transmitted to the user 6 and the decryption key decrypts encrypted information transmitted from the user 6 .
- the encryption key includes at least one of a public key of the user terminal 1 and a secret key and the decryption key includes at least one of a private key of the health care server 2 and a secret key.
- a selected cryptographic system is selected by the user 6 or the healthcare service provider 7 , and a suitable encryption key and decryption key are obtained according to the type of selected cryptographic system.
- a process of issuing and distributing an encryption key and a decryption key by the security key issuing device 3 and obtaining the encryption key and the decryption key by the security key obtaining unit 221 may be included in a process of the health care server 2 .
- the encrypting unit 222 encrypts an analysis result of the health information of the user 6 obtained by the information analyzing unit 25 by using the encryption key obtained from the security key obtaining unit 221 .
- the encrypting unit 222 encrypts the analysis result of the health information stored in the storage unit 24 .
- the decrypting unit 223 restores information encrypted in the user terminal 1 to original information in a process that is substantially the reverse of an encryption process.
- the decrypting unit 223 receives encrypted information through the identifier analyzing unit 23 and obtains a decryption key from the security key obtaining unit 221 .
- the decrypting unit 223 decrypts the encrypted information by using a decryption algorithm.
- Information encrypted in the encrypting unit 122 of the user terminal 1 is decrypted in the health care server 2 , thereby reconstructing original information before encryption, i.e., the health information of the user 6 .
- Information decrypted in the decrypting unit 223 of the health care server 2 is stored in the storage unit 24 .
- the healthcare service provider 7 may determine a health state of the user 6 by referring to the health information of the user 6 stored in the storage unit 24 .
- FIG. 6 is a flowchart illustrating an exemplary embodiment of a data flow during secure communication of the user terminal 1 with the health care server 2 when public key cryptography is used.
- the encrypting unit 122 obtains health information of the user 6 obtained by the health information obtaining unit 11 and encrypts the health information by using a public key of the health care server 2 .
- the encrypted information after passing through the identifier adding unit 14 , is transmitted to the health care server 2 through the network 4 .
- the encrypted information after passing through the identifier analyzing unit 23 , is decrypted by using a private key of the health care server 2 . As a result of the decryption, the health information of the user 6 is reconstructed.
- FIG. 7 is a flow chart illustrating an exemplary embodiment of a data flow during secure communication of the user terminal 1 with the health care server 2 when secret key cryptography is used.
- the data flow corresponds substantially to the data flow described in association with public key cryptography, except that the encryption and the decryption are performed using a secret key instead of the public key or the private key of the health care server 2 , as indicated in FIG. 7 .
- the security key obtaining unit 221 of the health care server 2 keeps encryption keys and decryption keys of a plurality of user terminals, and thus selects an encryption key and a decryption key for encryption and decryption according to the above-described analysis result of the identifier analyzing unit 23 .
- the encryption key may include a document, a device, an instrument and a related technique, and may be used as a single unit for converting information into a format in which the meaning of the information cannot be determined without decryption
- the decryption key may include a document, a device, an instrument and a related technique, and may be used as a single unit for restoring information, which has been converted into a format in which the meaning of the original information cannot be determined without decryption.
- the meaning of security management of the second security managing unit 22 includes all functions, methods and systems for protecting a communication network, system and application services from unauthorized access.
- the storage unit 24 stores health information of the user 6 , which is decrypted information output from the decrypting unit 223 , the analysis result of the health information of the user 6 obtained by the information analyzing unit 25 and mapping tables.
- an ID of the user 6 can be determined using an identifier with reference to the first mapping table 241 and personal information including health records of the user 6 can be accessed using the ID of the user 6 with reference to a second mapping table 242 .
- the healthcare service provider 7 may refer to health information of the user 6 through the storage unit 24 of the health care server 2 . Since information transmitted from the user terminal 1 does not include personal information of the user 6 , privacy and security for the user 6 are maintained in spite of the information loss during transmission over a network.
- the identifier is 000 and the decrypted information is a body temperature
- personal information of the user, “A” in the foregoing example can be determined.
- the personal information of user “A” may be a name, an age or a previous health record of “A”.
- the information analyzing unit 25 obtains the health information transmitted from the user terminal 1 from the storage unit 24 , analyzes the measurement result of the biological signal and stores an analysis result in the storage unit 24 .
- the analysis result after encryption, transmission over the network 4 and decryption, as further described above, is transmitted to a device including at least one of the information displaying unit 15 of the user terminal 1 and an information receiving device of the user 6 .
- a display method includes at least one of visual presentation on a display, a monitor, a light emitting display (“LED”) or the like and optionally auditory presentation by generation of a sound.
- the transmission includes a form of transmission performed by extended delivery media, except for the user terminal 1 , such as an electronic mail (“E-mail”), cell phone text message transmission or a fax machine, for example.
- FIG. 8 is a flowchart illustrating analysis of health information of the user 6 by the information analyzing unit 25 according to an exemplary embodiment.
- the information analyzing unit 25 obtains health information data of the user 6 stored in the storage unit 24 .
- the health information data of the user 6 includes an identifier for identifying a health information type and the health information, e.g., a measurement result of a biological signal.
- an identifier for the health information type is analyzed to determine the health information type.
- the health information type may be set to a digital value of 4 bits based on agreement between the user terminal 1 and the health care server 2 .
- an identifier for a health information type may be preset such that an identifier for a body temperature is 0000, an identifier for a weight is 0001, an identifier for a blood pressure value is 0002, and the like, for example, and the user terminal 1 transmits the identifier for the health information type through the health information in the form of a header file.
- the health care server 2 recognizes the health information type by using the identifier.
- a form of the identifier may also be a symbol or combination of symbols, or the like, without limitation to the foregoing embodiment.
- the information analyzing unit 25 determines the health information type. If the health information type of the user 6 is a body temperature, the information analyzing unit 25 determines that the health information is temperature data by referring to an identifier for the health information type, for example 0000 for the body temperature as further disclosed in the foregoing example.
- the information analyzing unit 25 compares the temperature data of the user 6 with a stored normal temperature.
- the information analyzing unit 25 determines a high body temperature when the temperature data is higher than the normal temperature, a normal body temperature when the temperature data is in a range of the normal temperature, and a low body temperature when the temperature data being lower than the normal temperature.
- the information analyzing unit 25 stores a result of the determination in the storage unit 24 .
- the result stored in the storage unit 24 may be referred to by the healthcare service provider 7 .
- the stored result may be received by at least one of the user terminal 1 and an information receiving device of the user 6 , which is an extended delivery medium.
- the information receiving device includes any device capable of receiving information through a network, such as an e-mail service, a cell phone text message service, a fax machine or the like.
- the transmission to the user terminal 1 includes all of encryption in the health care server 2 , transmission through the network 4 and decryption in the user terminal 1 .
- the security key issuing device 3 under control of the user 6 , the healthcare service provider 7 , or an operator of the security key issuing device 3 , the security key issuing device 3 issues an encryption key and a decryption key, stores the encryption key and the decryption key together with information of the user 6 and distributes the encryption key and the decryption key to the designated user terminal 1 and health care server 2 .
- local communication may be used or the encryption key and the decryption key may be stored in a portable storage medium.
- the security key issuing device 3 includes the security key issuing unit 31 , the security key storage unit 32 , the security key transmitting unit 33 and the security key recording unit 34 .
- the security key issuing unit 31 issues the encryption key and the decryption key in response to at least one of a request from the user 6 and the healthcare service provider 7 .
- a selected cryptographic system is selected by the user 6 or the healthcare service provider 7 , and a suitable security key is issued, stored and distributed as described above in association with the encryption.
- the security key is available in the designated user terminal 1 and health care server 2 .
- the security key storage unit 32 stores the issued encryption key and decryption key. Since, in an embodiment, the security key issuing device 3 issues encryption keys and decryption keys for a plurality of users, it may store an encryption key and a decryption key together with individual information of each of the users.
- the encryption key and the decryption key are distributed by using at least one of the security key transmitting unit 33 and the security key recording unit 34 .
- the user 6 or the healthcare service provider 7 may select a method for the distribution.
- the security key transmitting unit 33 transmits the issued encryption key and decryption key to the designated health care server 2 and user terminal 1 by using a local network.
- the local network directly connects the user terminal to the health care server 2 . In this way, security of the encryption key and the decryption key can be maintained.
- the security key recording unit 34 records an encryption key and a decryption key onto a portable storage medium connected to the security key issuing device 3 .
- the encryption key and the decryption key recorded onto the portable storage medium are transmitted by the user 6 and the healthcare service provider 7 to the security key obtaining unit 121 and the security key obtaining unit 221 through the local communicating unit 131 and local communicating unit 211 when the portable storage medium is connected to the user terminal 1 and the health care server 2 .
- the portable storage medium includes a portable computer-readable recording medium.
- Examples of the computer-readable recording medium include magnetic storage media, e.g., ROM, a floppy disk, a hard disk, and the like, and optical reading media, e.g., a CD-ROM, a DVDs, and the like.
- the encryption key and the decryption key which is a core part of secure communication, can be safely achieved. In other words, it is possible to substantially reduce or prevent hacking of the encryption key and the decryption key, which may occur during security key distribution through the Internet. Since the user terminal 1 is used as a device for transmitting health information of the user 6 rather than as a general-purpose medium and information transmission is performed based on agreement between the user 6 and the healthcare service provider 7 , the security key distribution can be performed safely as disclosed above.
- a process of issuing, storing, and transmitting a security key in an embodiment may be included in a process of manufacturing the user terminal 1 and the health care server 2 .
- the network 4 allows information to be exchanged between the user terminal 1 and the health care server 2 .
- the network 4 may be any one of a wired or wireless communication network, such as and including the Internet.
- the user terminal 1 , the health care server 2 , and the security key issuing device 3 illustrated in FIG. 2 may include other components for executing general functions, components related to the disclosed embodiment are illustrated in FIG. 2 for clarity and to avoid undue complexity.
- FIG. 9 is a flowchart illustrating an exemplary embodiment of a data flow in the security managing unit 12 and security managing unit 22 , which use a reinforced version of a selected cryptographic system. Encryption and decryption processes higher than second order processes are carried out by using an Ethernet medium access control (“MAC”) address, thereby establishing a reinforced security system.
- MAC medium access control
- an encryption algorithm 1222 performs primary encryption by using a primary encryption key 121 a and performs secondary encryption by using a first MAC address as a secondary encryption and decryption key 121 c .
- the encrypted information 1223 is transmitted to the health care server 2 , and during decryption in the health care server 2 , a decryption algorithm 2232 performs primary decryption by using a primary decryption key 221 b and performs secondary decryption by using a second MAC address as the secondary encryption and decryption key 221 c , thereby reconstructing health information before encryption.
- second order encryption and second order decryption may use a MAC address of the health care server 2 or a MAC address of the user terminal 1 .
- an encryption process higher than a second order process and a decryption process higher than a second order process, using both the MAC address of the health care server 2 and the MAC address of the user terminal 1 may be added.
- the health care server 2 transmits the MAC address of the health care server 2 to the security key obtaining unit 121 of the user terminal 1 by using local communication prior to an action such as transfer or delivery of the user terminal 1 to the user 6 .
- the MAC address of the health care server 2 is recorded in the security key obtaining unit 221 .
- the MAC address of the health care server 2 is used as a secondary encryption and decryption key 121 c and as a secondary encryption and decryption key 221 c .
- the MAC address of the health care server 2 is used as a secret key of secret key cryptography. In this way, by using the MAC address of the health care server 2 , a reinforced security system can be established.
- the MAC address of the user terminal 1 is transmitted to the security key obtaining unit 221 of the health care server 2 through a network after an action such as transferral or delivery of the user terminal 1 to the user 6 .
- the MAC address of the user terminal 1 is recorded in the security key obtaining unit 121 of the user terminal 1 .
- the MAC address of the user terminal 1 is used as a secret key of secret key cryptography.
- the MAC address of the user terminal is used as the secondary encryption and decryption key 121 c and the secondary encryption and decryption key 221 c .
- both the MAC address of the user terminal 1 and the MAC address of the health care server 2 are used, various embodiments may exist.
- an encryption process higher than a second order process and a decryption process higher than a second order process are performed by using both MAC addresses
- an embodiment wherein the MAC address of the user terminal 1 is used as a public key and the MAC address of the health care server 2 is used as a private key an embodiment wherein the MAC address of the health care server 2 is used as a public key and the MAC address of the user terminal 1 is used as a private key.
- the selected cryptographic system can be reinforced by a selection of the user 6 or the healthcare service provider 7 .
- FIG. 10 is a flowchart illustrating an exemplary embodiment of a method of securely communicating personal health information.
- the method of securely communicating personal health information according to an embodiment includes operations processed time-serially by the user terminal 1 and the health care server 2 , as further illustrated in FIG. 2 .
- the above description of the user terminal 1 and the health care server 2 is also applicable to the method of securely communicating personal health information according to n embodiment.
- an encryption key and a decryption key are issued by the security key issuing unit 31 and then stored in the security key storage unit 32 .
- the security key storage unit 32 stores the issued security key together with information of the user 6 for which the security key is issued.
- the issued security key is transmitted by using at least one of the security key transmitting unit 33 and the security key recording unit 34 of the security key issuing device 3 .
- a form of transmission includes at least one of transmission through a local network and a portable storage medium according to a selection of the user 6 , the healthcare service provider 7 and an operator of the security key issuing device 3 .
- the security key obtaining unit 121 and the security key obtaining unit 221 of the user terminal 1 and the health care server 2 obtain the encryption key and the decryption key.
- the encryption key and the decryption key may be received from the security key transmitting unit 33 or may the security key recording unit 34 .
- the user terminal 1 and the health care server 2 can continuously perform encryption and decryption of information.
- the biological signal measuring device 5 measures a biological signal of the user 6 .
- the health information obtaining unit 11 of the user terminal 1 obtains a measurement result of the biological signal.
- the measurement result may be obtained by input of the measurement result from the user 6 or by automatic input of the measurement result based on interaction between the biological signal measuring device 5 and the user terminal 1 .
- health information of the user 6 after passing through the health information obtaining unit 11 of the user terminal 1 , is encrypted by the encrypting unit 122 .
- a second transmitting operation 1006 encrypted information and an identifier added thereto by the identifier adding unit 14 are transmitted to the health care server 2 through the network communicating unit 132 .
- the user terminal 1 may store an algorithm related to transmission in the storage unit 16 .
- the algorithm may select a transmission interval for the health information of the user 6 , such as daily transmission, weekly transmission, monthly transmission or transmission each time a measurement is performed, according to a pattern of use by the user 6 , thereby allowing the user 6 to easily and conveniently transmit the health information.
- the transmission may use an existing wired or wireless communication network.
- the transmission may also be performed by recording the health information onto a computer-readable recording medium by the user 6 and directly providing the recorded health information to the healthcare service provider 7 .
- the network communicating unit 212 of the health care server 2 receives the encrypted information and the identifier.
- the identifier analyzing unit 23 of the health care server 2 analyzes the received identifier and decrypts the encrypted information by using the decryption key of the security key obtaining unit 221 .
- the health care server 2 stores the decrypted health information of the user 6 in the storage unit 24 , searches for an ID of the user 6 corresponding to the identifier by referring to the first mapping table 241 , and refers to personal information of the user 6 with reference to the second mapping table 242 .
- the health care server 2 analyzes the health information of the user 6 and transmits a result of the analysis to the user 6 .
- personal health information can be safely communicated between the user terminal 1 and the health care server 2 .
- An encryption key and a decryption key are transmitted by using local communication, thereby removing a risk of fraudulent use of the encryption key and the decryption key during distribution of the encryption key and the decryption key.
- the personal health information can be transmitted and received through the network 4 , such transmission/reception can be performed efficiently and conveniently. Only encrypted information is communicated between the user terminal 1 and the health care server 2 and the encrypted information does not include personal information of the user 6 , thereby substantially preventing or eliminating unwanted disclosure or leakage of personal health information.
- embodiments can also be implemented through computer readable code, instructions in and/or on a medium, e.g., a computer readable medium, to control at least one processing element to implement any above described embodiment.
- the medium can correspond to any medium/media permitting the storage and/or transmission of the computer readable code.
- the computer readable code can be recorded/transferred on a medium in a variety of ways, and examples of the medium including recording media, such as magnetic storage media (e.g. ROM, a floppy disk, a hard disk or the like and optical recording media, (e.g. a CD-ROM or a DVD), and transmission media such as media carrying or including carrier waves, as well as elements of the Internet.
- recording media such as magnetic storage media (e.g. ROM, a floppy disk, a hard disk or the like and optical recording media, (e.g. a CD-ROM or a DVD), and transmission media such as media carrying or including carrier waves, as well as elements of the Internet.
- the medium may be such a defined and measurable structure including or carrying a signal or information, such as a device carrying a bitstream according to one or more embodiments.
- the media may also be a distributed network, so that the computer readable code is stored/transferred and executed in a distributed fashion.
- the processing element could include a processor
- health information of a user can be safely transmitted to a designated health care server.
- An encryption key and a decryption key issued by a security key issuing device are transmitted to a user terminal and the health care server by using local communication, thereby safely distributing the encryption key and the decryption key.
- the user terminal and the health care server encrypt and decrypt the health information of the user by using an encryption key and a decryption key and the encrypted information is transmitted through a public network such as the Internet, whereby secure communication between the user terminal and the health care server can be continuously guaranteed.
- the information has been encrypted and personal information of the user is not included in the transmitted information by using mapping tables stored in the server, thereby guaranteeing security in information transmission.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Medical Informatics (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- Public Health (AREA)
- Pathology (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Biophysics (AREA)
- Primary Health Care (AREA)
- Epidemiology (AREA)
- Heart & Thoracic Surgery (AREA)
- Molecular Biology (AREA)
- Surgery (AREA)
- Animal Behavior & Ethology (AREA)
- Veterinary Medicine (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Storage Device Security (AREA)
Abstract
A method of securely communicating personal health information between a user terminal and a health care server. The method includes receiving an encryption key from a security key issuing device through a local communication between a user terminal and the security key issuing device; obtaining health information of a user; encrypting the health information by using the encryption key; and transmitting the encrypted health information to a health care server through a network communication between the user terminal and the health care server.
Description
- This application claims priority to Korean Patent Application No. 10-2008-0111217, filed on Nov. 10, 2008, and all the benefits accruing therefrom under 35 U.S.C. §119, the content of which in its entirety is herein incorporated by reference.
- 1. Field
- One or more embodiments relate to a method and apparatus for securely communicating personal health information.
- 2. Description of the Related Art
- At present, research is being actively conducted to establish a remote medical system for providing medical information and medical service to remote locations, and to provide a remote health monitoring service. In a remote medical service, a key factor is safe transmission of a user's health information. In the U.S., the government has enacted the Health Insurance Portability and Accountability Act (“HIPAA”) to ensure the security of personal health information. Public key cryptography and secret key cryptography are cryptographic systems currently used for secure communication. In these cryptographic systems, issuance of an initial encryption key and an initial decryption key is performed through the Internet.
- Provided are a method and apparatus for secure communication, in which an encryption key and a decryption key are safely distributed and a user's health information is safely transmitted and received.
- Provided are a computer-readable recording medium having recorded thereon a program for executing the method on a computer.
- Additional aspects will be set forth in part in the description which follows and, in part, will be apparent from the description, or may be learned by practice of the invention.
- Provided is a method of securely communicating between a user terminal and a health care server. The method includes receiving an encryption key from a security key issuing device through a local communication between a user terminal and the security key issuing device, obtaining health information of a user, encrypting the health information by using the encryption key, and transmitting the encrypted health information to a health care server through a network communication between the user terminal and the health care server.
- Provided is a method of securely communicating between a health care server and a user terminal. The method includes receiving a decryption key from a security key issuing device through a local communication between a health care server and the security key issuing device, receiving encrypted information through a network communication between the health care server and a user terminal, and decrypting the encrypted information by using the decryption key.
- Provided is a method of securely communicating between a user terminal and a health care server. The method includes transmitting an encryption key and a decryption key, which are issued by a security key issuing device to a user terminal and a health care server, encrypting health information of a user by using the encryption key, wherein the encrypting is performed in the user terminal, adding a unique identifier of the user to the encrypted health information; transmitting the unique identifier to the health care server through a network communication, decrypting the unique identifier by using the decryption key, wherein the decrypting is performed in the health care server; and recognizing personal information of the user by using the unique identifier.
- Provided is a computer-readable recording medium having recorded thereon a program for executing a method of securely communicating personal health information.
- Provided is a user terminal, including a health information obtaining unit for obtaining health information of a user, a local communicating unit, which receives an encryption key through a local communication between a user terminal and a security key issuing device, a security key obtaining unit, which obtains the encryption key, an encrypting unit, which encrypts the health information by using the encryption key, and a network communicating unit, which transmits the encrypted health information to a health care server through a network communication.
- Provided is a health care server system including a local communicating unit, which receives a decryption key through a local communication between a health care server and a security key issuing device, a security key obtaining unit, which obtains the decryption key, a network communicating unit, which receives encrypted information from a user terminal through a network communication, and a decrypting unit, which decrypts the encrypted information by using the decryption key.
- Provided is a security key issuing device for secure communication between a user terminal and a health care server. The security key issuing device includes a security key issuing unit, which issues at least one of an encryption key and a decryption key in response to a request from a healthcare service provider or a user, a security key storage unit, which stores the encryption key and the decryption key together with user information of a user terminal, and a security key transmitting unit, which transmits the encryption key and the decryption key to the user terminal and a health care server through a local communication.
- These and/or other aspects will become apparent and more readily appreciated from the following further description of the embodiments, taken in conjunction with the accompanying drawings in which:
-
FIG. 1 is a flowchart illustrating an exemplary embodiment of a secure communication environment for personal health information; -
FIG. 2 is a flowchart illustrating an exemplary embodiment of a structure of a secure communication system for personal health information; -
FIG. 3 is a flowchart illustrating an exemplary embodiment of a data flow in a security managing unit of a user terminal, which is illustrated inFIG. 2 , when public key cryptography is used; -
FIG. 4 is a flowchart illustrating an exemplary embodiment of a data flow in the security managing unit of the user terminal illustrated inFIG. 2 when secret key cryptography is used; -
FIG. 5 is a flowchart illustrating an exemplary embodiment of mapping tables of a storage unit illustrated inFIG. 2 ; -
FIG. 6 is a flowchart illustrating an exemplary embodiment of a data flow in secure communication of the user terminal with a health care server when public key cryptography is used; -
FIG. 7 is a flowchart illustrating an exemplary embodiment of a data flow in secure communication of the user terminal with the health care server when secret key cryptography is used; -
FIG. 8 is a flowchart illustrating an exemplary embodiment of a method of analyzing a user's health information by an information analyzing unit; -
FIG. 9 illustrates an exemplary embodiment of a data flow in security managing units, which use a reinforced version of a selected cryptographic system; and -
FIG. 10 is a flowchart illustrating an exemplary embodiment of a method of securely communicating personal health information. - Reference will now be made in detail to embodiments, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. In this regard, the present embodiments may have different forms and should not be construed as being limited to the descriptions set forth herein. Accordingly, the embodiments are merely described below, by referring to the figures, to further explain aspects of the present description.
- It will be understood that when an element is referred to as being “on” another element, it can be directly on the other element or intervening elements may be present therebetween. In contrast, when an element is referred to as being “directly on” another element, there are no intervening elements present. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
- It will be understood that, although the terms first, second, third etc. may be used herein to describe various elements, components, regions, layers and/or sections, these elements, components, regions, layers and/or sections should not be limited by these terms. These terms are only used to distinguish one element, component, region, layer or section from another element, component, region, layer or section. Thus, a first element, component, region, layer or section discussed below could be termed a second element, component, region, layer or section without departing from the teachings of the present invention.
- The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting. As used herein, the singular forms “a,” “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” or “includes” and/or “including” when used in this specification, specify the presence of stated features, regions, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, regions, integers, steps, operations, elements, components, and/or groups thereof.
- Furthermore, relative terms, such as “lower” or “bottom” and “upper” or “top,” may be used herein to describe one element's relationship to other elements as illustrated in the Figures. It will be understood that relative terms are intended to encompass different orientations of the device in addition to the orientation depicted in the Figures. For example, if the device in one of the figures is turned over, elements described as being on the “lower” side of other elements would then be oriented on “upper” sides of the other elements. The exemplary term “lower,” can therefore, encompasses both an orientation of “lower” and “upper,” depending on the particular orientation of the figure. Similarly, if the device in one of the figures is turned over, elements described as “below” or “beneath” other elements would then be oriented “above” the other elements. The exemplary terms “below” or “beneath” can, therefore, encompass both an orientation of above and below.
- Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
- The embodiments described herein should not be construed as limited to the particular shapes of regions as illustrated herein but are to include deviations in shapes. Thus, the regions illustrated in the figures are schematic in nature and their shapes are not intended to limit the scope of the present claims.
-
FIG. 1 is a flowchart illustrating an exemplary embodiment of a secure communication environment for personal health information. The secure communication environment for personal health information includes auser terminal 1, ahealth care server 2, a security key issuingdevice 3 and a biologicalsignal measuring device 5. The securitykey issuing device 3 issues and then transmits an encryption key and a decryption key to theuser terminal 1 and thehealth care server 2 through a local communication. Auser 6 measures a health state by using the biologicalsignal measuring device 5 and theuser terminal 1 obtains health information of theuser 6. Theuser terminal 1 and thehealth care server 2 communicate over anetwork 4, and the health information of theuser 6 is transmitted in an encrypted state to maintain security. Ahealthcare service provider 7 recognizes the health information of theuser 6 by using thehealth care server 2. - In an embodiment, the
health care server 2 and the securitykey issuing device 3 are separate devices. In another embodiment thehealth care server 2 and the securitykey issuing device 3 may be integrated into one device. For example, functions of the securitykey issuing device 3 may be included into thehealth care server 2. In an embodiment, the biologicalsignal measuring device 5 and theuser terminal 1 are separate devices. In another embodiment, the biologicalsignal measuring device 5 and theuser terminal 1 may be integrated into one device. For example, functions of theuser terminal 1 may be included in the biologicalsignal measuring device 5. -
FIG. 2 is a flowchart illustrating an exemplary embodiment of a structure of a secure communication system for personal health information. - The biological
signal measuring device 5 refers to a medical device and equipment for measuring a biological signal of theuser 6. For example, the biologicalsignal measuring device 5 may be an electroencephalograph, a brain wave analysis system, a retinal electrometer, a sphygmograph, a tocomonitor, a thermography, a slit lamp microscope, an anthropometer, a phonocardiograph, an electrocardiograph, a thermometer, a body weight scale, an ultrasonic blood flow meter, a hemadynamometer, a blood sugar monitor, a spirometer, or the like or a combination thereof. In an embodiment, the biological signal may be brain wave analysis data, an electromyogram, a body temperature, a blood pressure value, a body weight, an obesity index, a body fat mass, a liver value, a cholesterol value, a blood sugar value, or the like or a combination thereof. It will be understood by those of ordinary skill in the art that the biological signal, according to an embodiment, may include any value, state, or symptom related to health, and the biologicalsignal measuring device 5 may include any device or equipment for recognizing the biological signal. - The
user terminal 1 includes a healthinformation obtaining unit 11, asecurity managing unit 12, a communicatingunit 13, anidentifier adding unit 14, aninformation displaying unit 15, and astorage unit 16. - The health
information obtaining unit 11 obtains health information of theuser 6 from the biologicalsignal measuring device 5. The health information of theuser 6 may be obtained in at least one of two ways: by input from theuser 6 or by direct input based on the biologicalsignal measuring device 5 and theuser terminal 1. The way to obtain the health information of theuser 6 may be selected by theuser 6 or thehealthcare service provider 7. For example, if the biologicalsignal measuring device 5 is a thermometer, the healthinformation obtaining unit 11 obtains body temperature information of theuser 6, which is measured by the thermometer. In an embodiment, the obtaining of the body temperature information may be achieved by input of a body temperature measured by the thermometer from theuser 6 or by direct input of the body temperature measured by the thermometer to the healthinformation obtaining unit 11. Theuser terminal 1 may be linked to the biologicalsignal measuring device 5 or may include a function of the biologicalsignal measuring device 5. - The
security managing unit 12 includes a securitykey obtaining unit 121, an encryptingunit 122 and adecrypting unit 123. The securitykey obtaining unit 121 obtains an encryption key and a decryption key issued by the securitykey issuing device 3. The encryption key is used to encrypt the health information of theuser 6, and the decryption key is used to decrypt encrypted information transmitted from thehealthcare service provider 7 or thehealth care server 2. For cryptographic systems executing encryption and decryption, public key cryptography and secret key cryptography may be used. Public key cryptography is also referred to as asymmetric cryptography or public key/private key cryptography. Secret key cryptography is also referred to as symmetric cryptography. According to a type of the cryptographic system, an encryption key may include at least one of a public key and a secret key and a decryption key may include at least one of a private key and a secret key. The type of cryptographic system may be selected according to a selection of theuser 6 or thehealthcare service provider 7 and a suitable encryption key and decryption key are obtained according to the selected type. - The security
key obtaining unit 121 obtains an encryption key and a decryption key from a local communicatingunit 131 or reads them from a portable storage medium. More specifically, if the encryption key and the decryption key are transmitted over a local network between theuser terminal 1 and the securitykey issuing device 3, the securitykey obtaining unit 121 obtains the encryption key and the decryption key from the local communicatingunit 131. If the encryption key and the decryption key are transmitted from theuser 6 or thehealthcare service provider 7 and stored in a portable storage medium, the securitykey obtaining unit 121 reads the encryption key and the decryption key stored in the portable storage medium. In an embodiment, the portable storage medium may include a computer-readable recording medium, which is portable. Examples of the computer-readable recording medium include magnetic storage media, e.g., read-only memory (“ROM”), a floppy disk, a hard disk and the like, and optical reading media, e.g., a compact disk read only memory (“CD-ROM”), a digital versatile disk (“DVD”) and the like. - More specifically, in an embodiment wherein a
user 6 and ahealthcare service provider 7 agree or express their intent, such as by way of a health-related contract or other exchange of promises, thehealthcare service provider 7 issues and distributes an encryption key and a decryption key to thehealth care server 2 of thehealthcare service provider 7 and theuser terminal 1 to be delivered to theuser 6 by using the securitykey issuing device 3. The distributed encryption key and decryption key are kept in a securitykey obtaining unit 121 of theuser terminal 1 and a securitykey obtaining unit 221 of thehealth care server 2. - If the encryption key and the decryption key are transmitted while stored in a portable storage medium, at least one of an encryption key and a decryption key issued by a security
key issuing unit 31 is recorded by a securitykey recording unit 34 onto the portable storage medium, which may be connected to the securitykey issuing device 3. The portable storage medium, while connected to theuser terminal 1, may read a stored encryption key or a stored decryption key by using the local communicatingunit 131 of theuser terminal 1, and the securitykey obtaining unit 121 of theuser terminal 1 may read the encryption key or the decryption key. - In an embodiment, a security key may be issued over a network, such as the Internet. A security problem may occur when the issued security key is distributed over the Internet. By using local communication, as in the foregoing embodiment, the security key can be safely distributed. Moreover, in an embodiment, information is transmitted between parties based on prior agreement of expressions of intention, such as a contract, making it possible to skip a separate authentication process.
- It will be understood by those of ordinary skill in the art that a process of issuing and distributing an encryption key and a decryption key by the security
key issuing device 3 and obtaining the encryption key and the decryption key by the securitykey obtaining unit 121 may be included in a process of manufacturing theuser terminal 1 and thehealth care server 2. - The encrypting
unit 122 encrypts health information obtained from the healthinformation obtaining unit 11 by using an encryption key obtained from the securitykey obtaining unit 121 in a selected cryptographic system. In other words, by using the encryption key, the encryptingunit 122 converts the health information of theuser 6 into a format in which the meaning of the health information cannot be determined without description. For example, the selected cryptographic system for executing encryption may be one of public key cryptography and secret key cryptography. When public key cryptography is used for encryption, the encryption key is a public key of a receiver, i.e., thehealth care server 2. When secret key cryptography is used for encryption, the encryption key is a secret key. - The decrypting
unit 123 decrypts encrypted information obtained from thenetwork communicating unit 132 by using a decryption key obtained from the securitykey obtaining unit 121 in the selected cryptographic system. In other words, the decryptingunit 123 restores the encrypted information transmitted from thehealth care server 2 to original information before decryption by using the decryption key. As mentioned above, when public key cryptography is used, the decryption key is a private key of theuser terminal 1. When secret key cryptography is used, the decryption key is a secret key.FIGS. 3 and 4 are flow charts illustrating an exemplary embodiment of data flow in the firstsecurity managing unit 12, which is illustrated inFIG. 1 . -
FIG. 3 is a flowchart illustrating an exemplary embodiment of a data flow in the firstsecurity managing unit 12 of theuser terminal 1, which is illustrated inFIG. 2 , when public key cryptography is used. When information is transmitted from theuser terminal 1 to thehealth care server 2, the encryptingunit 122 encryptshealth information 1221 of theuser 6 obtained from the healthinformation obtaining unit 11 with anencryption algorithm 1222 a, which uses apublic key 1211 of thehealth care server 2 obtained by the securitykey obtaining unit 121. Thehealth information 1221 of theuser 6 is converted toencrypted information 1223 using theencryption algorithm 1222 a. - The decrypting
unit 123, when receiving information encrypted in thehealth care server 2, decryptsencrypted information 1233 obtained from thenetwork communicating unit 132 with adecryption algorithm 1232 a, which uses aprivate key 1212 of theuser terminal 1 obtained by the securitykey obtaining unit 121. Theencrypted information 1233 transmitted from thehealth care server 2 is restored to decryptedinformation 1231 usingdecryption algorithm 1232 a, thereby restoring original information, which thehealth care server 2 transmits. -
FIG. 4 is a flowchart illustrating an exemplary embodiment of a data flow in the firstsecurity managing unit 12 of theuser terminal 1, which is illustrated inFIG. 2 , when secret key cryptography is used. When information is transmitted from theuser terminal 1 to thehealth care server 2, the encryptingunit 122 encryptshealth information 1221 of theuser 6 obtained from the healthinformation obtaining unit 11 using anencryption algorithm 1222 b, which uses asecret key 1213 of the securitykey obtaining unit 121. Thehealth information 1221 of theuser 6 is converted intoencrypted information 1223 using theencryption algorithm 1222 b. - The decrypting
unit 123, after receiving information encrypted in thehealth care server 2, decryptsencrypted information 1233 obtained from thenetwork communicating unit 132, with adecryption algorithm 1232 b which uses asecret key 1213 of the securitykey obtaining unit 121. Theencrypted information 1233 transmitted from thehealth care server 2 is restored to decryptedinformation 1231 using thethird decryption algorithm 1232 b, thereby restoring original information, which thehealth care server 2 transmits. - It will be understood by those of ordinary skill in the art that the
encryption algorithm 1222 a and thedecryption algorithm 1232 a are commercially available algorithms used in public key cryptography and theencryption algorithm 1222 b and thedecryption algorithm 1232 b are commercially available algorithms used in secret key cryptography. - A security key, which hereinafter will collectively refer to an encryption key and a decryption key, is selected according to a type of selected cryptography system. In other words, when public key cryptography is used for encryption, the encryption key is a public key of the
health care server 2 and the decryption key is a private key of theuser terminal 1. When secret key cryptography is used for encryption, the encryption key and the decryption key are secret keys. - It will be also understood by those of ordinary skill in the art that in an embodiment, the encryption key may includes a document, a device, an instrument and a related technique, and may be used as a single unit for converting information into a format in which the meaning of the information cannot be determined without decryption, and the decryption key may include a document, a device, an instrument and a related technique, and may used as a single unit for restoring information, which has been converted into a format in which the meaning of the information cannot be determined without decryption, to original information. It will also be understood by those of ordinary skill in the art that in an embodiment the meaning of security management of the
security managing unit 22 includes all functions, methods, and systems for protecting a communication network and system and application services from unauthorized access. - Referring to
FIG. 2 , theidentifier adding unit 14 adds a unique identifier of theuser terminal 1 to encrypted information being output from the encryptingunit 122. The identifier may be a symbol or a set of symbols used to indicate characteristics of theuser terminal 1. Thehealth care server 2 may be identified by the unique identifier of theuser terminal 1 as theparticular user terminal 1 among a plurality of health user terminals communicating with thehealth care server 2. For example, the identifier may include a symbol or a set of symbols, such as a device serial number of theuser terminal 1, which is based on a contract made between theuser 6 and thehealthcare service provider 7. - For example, if the identifier of the
user terminal 1 is 000, theidentifier adding unit 14 adds theunique identifier 000 of theuser terminal 1 to encrypted information encrypted by the encryptingunit 122 and transmits the addition result to thehealth care server 2 through thenetwork communicating unit 132. During transmission of personal health information, encrypted health information and an identifier are transmitted, whereas a user's personal information is not transmitted. Thus, in spite of unauthorized receipt of user's health information during transmission, as may occur by hacking or hijacking, secure communication is possible in which high-level security is substantially guaranteed by protecting a user's privacy because user's personal information is not included in the transmitted personal health information. - The communicating
unit 13 includes the local communicatingunit 131 and thenetwork communicating unit 132. The local communicatingunit 131 transmits the encryption key and the decryption key issued by the securitykey issuing device 3 to the securitykey obtaining unit 121 of theuser terminal 1 by using local communication. According to a selection of theuser 6 or thehealthcare service provider 7, the security key may be distributed to the securitykey obtaining unit 121 of theuser terminal 1 by using a local network or by recording the security key onto a portable storage medium. - More specifically, the encryption key and the decryption key issued by the security
key issuing unit 31 of the securitykey issuing device 3 are stored in a securitykey storage unit 32, together with personal information of theuser 6. When a local network is used for transmission of the encryption key and the decryption key, the encryption key and the decryption key are transmitted by a securitykey transmitting unit 33 to the securitykey obtaining unit 121 through the local communicatingunit 131. When a portable storage medium is used for transmission of the encryption key and the decryption key, the encryption key and the decryption key are recorded by the securitykey recording unit 34 onto the portable storage medium connected to the securitykey issuing device 3 and the encryption key and the decryption key stored in the portable storage medium are read by the local communicatingunit 131 from the portable storage medium connected to theuser terminal 1. The encryption key and decryption key are then transmitted to the securitykey obtaining unit 121. The portable storage medium includes any portable computer-readable recording medium. Examples of the computer-readable recording medium include magnetic storage media, e.g., ROM, a floppy disk, a hard disk and the like, and optical reading media, e.g., a CD-ROM, a DVD and the like. - It will be understood by those of ordinary skill in the art that a process of issuing the encryption key and the decryption key and transmitting them to the
user terminal 1 and thehealth care server 2 by the securitykey issuing device 3 may be included in a process of manufacturing theuser terminal 1 and thehealth care server 2. - As further mentioned above, since distribution of an encryption key and a decryption key is performed through local communication, a problem in security key distribution using the Internet, i.e., fraudulent use of a security key, can be substantially prevented or eliminated. Transmission of personal health information is generally performed based on a contract between the
user 6 and thehealthcare service provider 7 and theuser terminal 1 does not use a web browser. In this regard, it may be difficult to apply a general communication security method to the transmission of the personal health information. Thus, by using the one of the foregoing embodiments, secure communication of personal health information can be performed. In addition, since theuser terminal 1 interacts with thehealth care server 2, an encryption key and a decryption key are distributed by using local communication before delivery, transfer, or lending of theuser terminal 1 to theuser 6 occurs, thereby providing secure communication. - The
network communicating unit 132 transmits a result of adding an identifier to information encrypted by the encryptingunit 122 by theidentifier adding unit 14 to thehealth care server 2 through thenetwork 4, or receives and outputs information transmitted from thehealth care server 2 to thedecrypting unit 123. It will be understood by those of ordinary skill in the art that in an embodiment, thenetwork 4 may be generally the Internet, but may also be another type of network such as a wireless local area network (“WLAN”). - The
information displaying unit 15 displays a measurement result of a biological signal of theuser 6 and information received from thehealth care server 2. Theinformation displaying unit 15 may include a device for displaying visual information, e.g., a display, a liquid crystal display (“LCD”) screen, a light emitting diode (“LED”), a scale display device or the like and a device for displaying auditory information, e.g., a speaker or the like. - The
storage unit 16 stores the measurement result of the biological signal of theuser 6 and the information received from thehealth care server 2. Whether to store the measurement result and the received information is selected by a selection of theuser 6. In other words, theuser 6 may control theuser terminal 1 to store desired information. - In an embodiment, the
health care server 2 includes a communicatingunit 21, asecurity managing unit 22, anidentifier analyzing unit 23, astorage unit 24 and aninformation analyzing unit 25. Thehealth care server 2 may be a server, which stores, analyzes and provides information related to the health of theuser 6. In an embodiment, health care includes all actions to be made in pursuit of maintaining and promoting health and preventing disease. - The communicating
unit 21 includes a local communicatingunit 211 and anetwork communicating unit 212. The local communicatingunit 211 transmits at least one of an encryption key and a decryption key issued by the securitykey issuing device 3 to the securitykey obtaining unit 221 of thehealth care server 2 through local communication. According to a selection of theuser 6 or thehealthcare service provider 7, a local network may be used, or an issued security key may be recorded onto a portable storage medium and then distributed to the securitykey obtaining unit 221 of thehealth care server 2 by using the portable storage medium. As disclosed further above, the portable storage medium may be a portable computer-readable recording medium. Examples of the computer-readable recording medium include magnetic storage media, e.g., ROM, a floppy disk, a hard disk and the like, and optical reading media, e.g., a CD-ROM, a DVD and the like. - The
network communicating unit 212 outputs information received through thenetwork 4 to adecrypting unit 223 through theidentifier analyzing unit 23, or transmits information encrypted by an encryptingunit 222 to theuser terminal 1 through thenetwork 4. As mentioned previously, it will be understood by those of ordinary skill in the art that in the current embodiment, thenetwork 4 may be generally the Internet, but may also be another type of network such as a wireless local area network (“WLAN”). - To analyze an identifier included in information received from the
network communicating unit 212, theidentifier analyzing unit 23 recognizes theuser 6 of theuser terminal 1 which transmits the information by referring to a mapping table 241 of thestorage unit 24 and controls the securitykey obtaining unit 221 to use an encryption key and a decryption key that are previously agreed with theuser terminal 1.FIG. 5 illustrates mapping tables of thestorage unit 24 illustrated inFIG. 2 . - For example, if an identifier of the
user terminal 1 is 000, the information received from thenetwork communicating unit 212 includes theidentifier 000 and encrypted information. Theidentifier analyzing unit 23 recognizes that a user identification (“ID”) corresponding to theidentifier 000 is a particular value, for example “A” in mapping table 1, by referring to a first mapping table 241. Theidentifier analyzing unit 23 also controls the securitykey obtaining unit 221 to use an encryption key and a decryption key that are previously agreed with the particular user, for example “A”. - Referring again to
FIG. 2 , thesecurity managing unit 22 includes the securitykey obtaining unit 221, the encryptingunit 222, and thedecrypting unit 223. - The security
key obtaining unit 221 obtains an encryption key and a decryption key issued by the securitykey issuing device 3. The encryption key encrypts information to be transmitted to theuser 6 and the decryption key decrypts encrypted information transmitted from theuser 6. According to a type of a selected cryptographic system, as described further above in association with theuser terminal 1, the encryption key includes at least one of a public key of theuser terminal 1 and a secret key and the decryption key includes at least one of a private key of thehealth care server 2 and a secret key. A selected cryptographic system is selected by theuser 6 or thehealthcare service provider 7, and a suitable encryption key and decryption key are obtained according to the type of selected cryptographic system. - It will be understood by those of ordinary skill in the art that a process of issuing and distributing an encryption key and a decryption key by the security
key issuing device 3 and obtaining the encryption key and the decryption key by the securitykey obtaining unit 221 may be included in a process of thehealth care server 2. - The encrypting
unit 222 encrypts an analysis result of the health information of theuser 6 obtained by theinformation analyzing unit 25 by using the encryption key obtained from the securitykey obtaining unit 221. By using a selected cryptographic system selected by theuser 6 or thehealthcare service provider 7, the encryptingunit 222 encrypts the analysis result of the health information stored in thestorage unit 24. - The decrypting
unit 223 restores information encrypted in theuser terminal 1 to original information in a process that is substantially the reverse of an encryption process. The decryptingunit 223 receives encrypted information through theidentifier analyzing unit 23 and obtains a decryption key from the securitykey obtaining unit 221. The decryptingunit 223 decrypts the encrypted information by using a decryption algorithm. Information encrypted in theencrypting unit 122 of theuser terminal 1 is decrypted in thehealth care server 2, thereby reconstructing original information before encryption, i.e., the health information of theuser 6. Information decrypted in thedecrypting unit 223 of thehealth care server 2 is stored in thestorage unit 24. Thehealthcare service provider 7 may determine a health state of theuser 6 by referring to the health information of theuser 6 stored in thestorage unit 24. -
FIG. 6 is a flowchart illustrating an exemplary embodiment of a data flow during secure communication of theuser terminal 1 with thehealth care server 2 when public key cryptography is used. The encryptingunit 122 obtains health information of theuser 6 obtained by the healthinformation obtaining unit 11 and encrypts the health information by using a public key of thehealth care server 2. The encrypted information, after passing through theidentifier adding unit 14, is transmitted to thehealth care server 2 through thenetwork 4. In thehealth care server 2, the encrypted information, after passing through theidentifier analyzing unit 23, is decrypted by using a private key of thehealth care server 2. As a result of the decryption, the health information of theuser 6 is reconstructed. -
FIG. 7 is a flow chart illustrating an exemplary embodiment of a data flow during secure communication of theuser terminal 1 with thehealth care server 2 when secret key cryptography is used. The data flow corresponds substantially to the data flow described in association with public key cryptography, except that the encryption and the decryption are performed using a secret key instead of the public key or the private key of thehealth care server 2, as indicated inFIG. 7 . - The security
key obtaining unit 221 of thehealth care server 2 keeps encryption keys and decryption keys of a plurality of user terminals, and thus selects an encryption key and a decryption key for encryption and decryption according to the above-described analysis result of theidentifier analyzing unit 23. - As is further disclosed above, it will be understood by those of ordinary skill in the art that in an embodiment, the encryption key may include a document, a device, an instrument and a related technique, and may be used as a single unit for converting information into a format in which the meaning of the information cannot be determined without decryption, and the decryption key may include a document, a device, an instrument and a related technique, and may be used as a single unit for restoring information, which has been converted into a format in which the meaning of the original information cannot be determined without decryption. It will be also understood by those of ordinary skill in the art that in an embodiment, the meaning of security management of the second
security managing unit 22 includes all functions, methods and systems for protecting a communication network, system and application services from unauthorized access. - The
storage unit 24 stores health information of theuser 6, which is decrypted information output from the decryptingunit 223, the analysis result of the health information of theuser 6 obtained by theinformation analyzing unit 25 and mapping tables. Referring toFIG. 5 , an ID of theuser 6 can be determined using an identifier with reference to the first mapping table 241 and personal information including health records of theuser 6 can be accessed using the ID of theuser 6 with reference to a second mapping table 242. Thehealthcare service provider 7 may refer to health information of theuser 6 through thestorage unit 24 of thehealth care server 2. Since information transmitted from theuser terminal 1 does not include personal information of theuser 6, privacy and security for theuser 6 are maintained in spite of the information loss during transmission over a network. - For example, if the identifier is 000 and the decrypted information is a body temperature, it is possible to determine that an ID of the
user 6 is “A” by referring to the first mapping table. That is, it can be determined that theuser terminal 1 of theuser 6 having the ID “A” transmits a measurement result of the body temperature of theuser 6 to thehealth care server 2. In addition, by referring to the second mapping table, personal information of the user, “A” in the foregoing example, can be determined. For example, the personal information of user “A” may be a name, an age or a previous health record of “A”. - The
information analyzing unit 25 obtains the health information transmitted from theuser terminal 1 from thestorage unit 24, analyzes the measurement result of the biological signal and stores an analysis result in thestorage unit 24. The analysis result, after encryption, transmission over thenetwork 4 and decryption, as further described above, is transmitted to a device including at least one of theinformation displaying unit 15 of theuser terminal 1 and an information receiving device of theuser 6. A display method includes at least one of visual presentation on a display, a monitor, a light emitting display (“LED”) or the like and optionally auditory presentation by generation of a sound. The transmission includes a form of transmission performed by extended delivery media, except for theuser terminal 1, such as an electronic mail (“E-mail”), cell phone text message transmission or a fax machine, for example. -
FIG. 8 is a flowchart illustrating analysis of health information of theuser 6 by theinformation analyzing unit 25 according to an exemplary embodiment. - In
first operation 801, theinformation analyzing unit 25 obtains health information data of theuser 6 stored in thestorage unit 24. The health information data of theuser 6 includes an identifier for identifying a health information type and the health information, e.g., a measurement result of a biological signal. - In
second operation 802, an identifier for the health information type is analyzed to determine the health information type. In an embodiment, for the determination, the health information type may be set to a digital value of 4 bits based on agreement between theuser terminal 1 and thehealth care server 2. For example, an identifier for a health information type may be preset such that an identifier for a body temperature is 0000, an identifier for a weight is 0001, an identifier for a blood pressure value is 0002, and the like, for example, and theuser terminal 1 transmits the identifier for the health information type through the health information in the form of a header file. Thehealth care server 2 recognizes the health information type by using the identifier. However, a form of the identifier may also be a symbol or combination of symbols, or the like, without limitation to the foregoing embodiment. - In
third operation 803, theinformation analyzing unit 25 determines the health information type. If the health information type of theuser 6 is a body temperature, theinformation analyzing unit 25 determines that the health information is temperature data by referring to an identifier for the health information type, for example 0000 for the body temperature as further disclosed in the foregoing example. - In
fourth operation 804, theinformation analyzing unit 25 compares the temperature data of theuser 6 with a stored normal temperature. Theinformation analyzing unit 25 determines a high body temperature when the temperature data is higher than the normal temperature, a normal body temperature when the temperature data is in a range of the normal temperature, and a low body temperature when the temperature data being lower than the normal temperature. - In
fifth operation 805, theinformation analyzing unit 25 stores a result of the determination in thestorage unit 24. The result stored in thestorage unit 24 may be referred to by thehealthcare service provider 7. - In
sixth operation 806, the stored result may be received by at least one of theuser terminal 1 and an information receiving device of theuser 6, which is an extended delivery medium. For example, the information receiving device includes any device capable of receiving information through a network, such as an e-mail service, a cell phone text message service, a fax machine or the like. The transmission to theuser terminal 1 includes all of encryption in thehealth care server 2, transmission through thenetwork 4 and decryption in theuser terminal 1. - Referring further to
FIG. 2 , under control of theuser 6, thehealthcare service provider 7, or an operator of the securitykey issuing device 3, the securitykey issuing device 3 issues an encryption key and a decryption key, stores the encryption key and the decryption key together with information of theuser 6 and distributes the encryption key and the decryption key to the designateduser terminal 1 andhealth care server 2. As further disclosed above, for the distribution of the encryption key and the decryption key, local communication may be used or the encryption key and the decryption key may be stored in a portable storage medium. - More specifically, the security
key issuing device 3 includes the securitykey issuing unit 31, the securitykey storage unit 32, the securitykey transmitting unit 33 and the securitykey recording unit 34. The securitykey issuing unit 31 issues the encryption key and the decryption key in response to at least one of a request from theuser 6 and thehealthcare service provider 7. A selected cryptographic system is selected by theuser 6 or thehealthcare service provider 7, and a suitable security key is issued, stored and distributed as described above in association with the encryption. The security key is available in the designateduser terminal 1 andhealth care server 2. - The security
key storage unit 32 stores the issued encryption key and decryption key. Since, in an embodiment, the securitykey issuing device 3 issues encryption keys and decryption keys for a plurality of users, it may store an encryption key and a decryption key together with individual information of each of the users. - The encryption key and the decryption key are distributed by using at least one of the security
key transmitting unit 33 and the securitykey recording unit 34. Theuser 6 or thehealthcare service provider 7 may select a method for the distribution. The securitykey transmitting unit 33 transmits the issued encryption key and decryption key to the designatedhealth care server 2 anduser terminal 1 by using a local network. In the current embodiment, the local network directly connects the user terminal to thehealth care server 2. In this way, security of the encryption key and the decryption key can be maintained. - In an embodiment, the security
key recording unit 34 records an encryption key and a decryption key onto a portable storage medium connected to the securitykey issuing device 3. The encryption key and the decryption key recorded onto the portable storage medium are transmitted by theuser 6 and thehealthcare service provider 7 to the securitykey obtaining unit 121 and the securitykey obtaining unit 221 through the local communicatingunit 131 and local communicatingunit 211 when the portable storage medium is connected to theuser terminal 1 and thehealth care server 2. In an embodiment, the portable storage medium includes a portable computer-readable recording medium. Examples of the computer-readable recording medium include magnetic storage media, e.g., ROM, a floppy disk, a hard disk, and the like, and optical reading media, e.g., a CD-ROM, a DVDs, and the like. - As described above, distribution of the encryption key and the decryption key, which is a core part of secure communication, can be safely achieved. In other words, it is possible to substantially reduce or prevent hacking of the encryption key and the decryption key, which may occur during security key distribution through the Internet. Since the
user terminal 1 is used as a device for transmitting health information of theuser 6 rather than as a general-purpose medium and information transmission is performed based on agreement between theuser 6 and thehealthcare service provider 7, the security key distribution can be performed safely as disclosed above. - It will be understood by those of ordinary skill in the art that a process of issuing, storing, and transmitting a security key in an embodiment may be included in a process of manufacturing the
user terminal 1 and thehealth care server 2. - The
network 4 allows information to be exchanged between theuser terminal 1 and thehealth care server 2. As mentioned previously, for example, thenetwork 4 may be any one of a wired or wireless communication network, such as and including the Internet. - Since fraudulent use of a security key may be prevented by using the security
key issuing device 3, safe transmission of personal health information is guaranteed even when an existing communication network is used. Information transmitted over thenetwork 4 is encrypted information, and thus health information of theuser 6 is not leaked in spite of hacking of the information. Moreover, the privacy of theuser 6 is guaranteed because personal information of theuser 6 is not included in the transmitted information. - Although the
user terminal 1, thehealth care server 2, and the securitykey issuing device 3 illustrated inFIG. 2 may include other components for executing general functions, components related to the disclosed embodiment are illustrated inFIG. 2 for clarity and to avoid undue complexity. -
FIG. 9 is a flowchart illustrating an exemplary embodiment of a data flow in thesecurity managing unit 12 andsecurity managing unit 22, which use a reinforced version of a selected cryptographic system. Encryption and decryption processes higher than second order processes are carried out by using an Ethernet medium access control (“MAC”) address, thereby establishing a reinforced security system. - More specifically, during encryption, an
encryption algorithm 1222 performs primary encryption by using a primary encryption key 121 a and performs secondary encryption by using a first MAC address as a secondary encryption anddecryption key 121 c. Theencrypted information 1223 is transmitted to thehealth care server 2, and during decryption in thehealth care server 2, adecryption algorithm 2232 performs primary decryption by using aprimary decryption key 221 b and performs secondary decryption by using a second MAC address as the secondary encryption anddecryption key 221 c, thereby reconstructing health information before encryption. In other words, by adding an encryption process higher than a second order process and a decryption process higher than a second order process to theencryption algorithm 1222 and thedecryption algorithm 2232, respectively, the above-described functions can be executed. Similarly, transmitting an information from thehealth care server 22 to theuser terminal 12 by using a reinforced version of the selected cryptographic system is available. It will be understood by those of ordinary skill in the art that when an encryption process higher than a first order process and a decryption process higher than a first order process are performed, the temporal sequence of encryption and decryption may vary regardless of the ranking of the order. According to an exemplary embodiment, second order encryption and second order decryption may use a MAC address of thehealth care server 2 or a MAC address of theuser terminal 1. Moreover, according to another exemplary embodiment, an encryption process higher than a second order process and a decryption process higher than a second order process, using both the MAC address of thehealth care server 2 and the MAC address of theuser terminal 1, may be added. A more detailed description will now be made of each of the embodiments. - When the MAC address of the
health care server 2 is used, thehealth care server 2 transmits the MAC address of thehealth care server 2 to the securitykey obtaining unit 121 of theuser terminal 1 by using local communication prior to an action such as transfer or delivery of theuser terminal 1 to theuser 6. In addition, the MAC address of thehealth care server 2 is recorded in the securitykey obtaining unit 221. The MAC address of thehealth care server 2 is used as a secondary encryption anddecryption key 121 c and as a secondary encryption anddecryption key 221 c. In other words, the MAC address of thehealth care server 2 is used as a secret key of secret key cryptography. In this way, by using the MAC address of thehealth care server 2, a reinforced security system can be established. - When the MAC address of the
user terminal 1 is used, the MAC address of theuser terminal 1 is transmitted to the securitykey obtaining unit 221 of thehealth care server 2 through a network after an action such as transferral or delivery of theuser terminal 1 to theuser 6. In addition, the MAC address of theuser terminal 1 is recorded in the securitykey obtaining unit 121 of theuser terminal 1. In other words, the MAC address of theuser terminal 1 is used as a secret key of secret key cryptography. The MAC address of the user terminal is used as the secondary encryption anddecryption key 121 c and the secondary encryption anddecryption key 221 c. However, although there is a risk of fraudulent use of the MAC address of theuser terminal 1 because a network, instead of local communication, has to be used, during transmission of the MAC address to thehealth care server 2, such transmission supplements existing first order encryption and decryption, thereby reinforcing existing security. - When both the MAC address of the
user terminal 1 and the MAC address of thehealth care server 2 are used, various embodiments may exist. In other words, in an embodiment where an encryption process higher than a second order process and a decryption process higher than a second order process are performed by using both MAC addresses, an embodiment wherein the MAC address of theuser terminal 1 is used as a public key and the MAC address of thehealth care server 2 is used as a private key, and an embodiment wherein the MAC address of thehealth care server 2 is used as a public key and the MAC address of theuser terminal 1 is used as a private key. The selected cryptographic system can be reinforced by a selection of theuser 6 or thehealthcare service provider 7. -
FIG. 10 is a flowchart illustrating an exemplary embodiment of a method of securely communicating personal health information. Referring toFIG. 10 , the method of securely communicating personal health information according to an embodiment includes operations processed time-serially by theuser terminal 1 and thehealth care server 2, as further illustrated inFIG. 2 . Thus, the above description of theuser terminal 1 and thehealth care server 2 is also applicable to the method of securely communicating personal health information according to n embodiment. - In an issuing and storing
operation 1001, in the securitykey issuing device 3, an encryption key and a decryption key are issued by the securitykey issuing unit 31 and then stored in the securitykey storage unit 32. The securitykey storage unit 32 stores the issued security key together with information of theuser 6 for which the security key is issued. - In a
first transmitting operation 1002, the issued security key is transmitted by using at least one of the securitykey transmitting unit 33 and the securitykey recording unit 34 of the securitykey issuing device 3. A form of transmission includes at least one of transmission through a local network and a portable storage medium according to a selection of theuser 6, thehealthcare service provider 7 and an operator of the securitykey issuing device 3. - In an obtaining
operation 1003, the securitykey obtaining unit 121 and the securitykey obtaining unit 221 of theuser terminal 1 and thehealth care server 2 obtain the encryption key and the decryption key. In other words, the encryption key and the decryption key may be received from the securitykey transmitting unit 33 or may the securitykey recording unit 34. By using the obtained security key, theuser terminal 1 and thehealth care server 2 can continuously perform encryption and decryption of information. - In a
measuring operation 1004, the biologicalsignal measuring device 5 measures a biological signal of theuser 6. The healthinformation obtaining unit 11 of theuser terminal 1 obtains a measurement result of the biological signal. As previously mentioned, the measurement result may be obtained by input of the measurement result from theuser 6 or by automatic input of the measurement result based on interaction between the biologicalsignal measuring device 5 and theuser terminal 1. - In an
encrypting operation 1005, health information of theuser 6, after passing through the healthinformation obtaining unit 11 of theuser terminal 1, is encrypted by the encryptingunit 122. - In a
second transmitting operation 1006, encrypted information and an identifier added thereto by theidentifier adding unit 14 are transmitted to thehealth care server 2 through thenetwork communicating unit 132. Theuser terminal 1 may store an algorithm related to transmission in thestorage unit 16. For example, the algorithm may select a transmission interval for the health information of theuser 6, such as daily transmission, weekly transmission, monthly transmission or transmission each time a measurement is performed, according to a pattern of use by theuser 6, thereby allowing theuser 6 to easily and conveniently transmit the health information. The transmission may use an existing wired or wireless communication network. The transmission may also be performed by recording the health information onto a computer-readable recording medium by theuser 6 and directly providing the recorded health information to thehealthcare service provider 7. - In receiving operation 1007, the
network communicating unit 212 of thehealth care server 2 receives the encrypted information and the identifier. - In analyzing
operation 1008, theidentifier analyzing unit 23 of thehealth care server 2 analyzes the received identifier and decrypts the encrypted information by using the decryption key of the securitykey obtaining unit 221. - In referring
operation 1009, thehealth care server 2 stores the decrypted health information of theuser 6 in thestorage unit 24, searches for an ID of theuser 6 corresponding to the identifier by referring to the first mapping table 241, and refers to personal information of theuser 6 with reference to the second mapping table 242. - In
second analyzing operation 1010, thehealth care server 2 analyzes the health information of theuser 6 and transmits a result of the analysis to theuser 6. - As is apparent from the foregoing description, personal health information can be safely communicated between the
user terminal 1 and thehealth care server 2. An encryption key and a decryption key are transmitted by using local communication, thereby removing a risk of fraudulent use of the encryption key and the decryption key during distribution of the encryption key and the decryption key. Moreover, since the personal health information can be transmitted and received through thenetwork 4, such transmission/reception can be performed efficiently and conveniently. Only encrypted information is communicated between theuser terminal 1 and thehealth care server 2 and the encrypted information does not include personal information of theuser 6, thereby substantially preventing or eliminating unwanted disclosure or leakage of personal health information. - In addition, other embodiments can also be implemented through computer readable code, instructions in and/or on a medium, e.g., a computer readable medium, to control at least one processing element to implement any above described embodiment. The medium can correspond to any medium/media permitting the storage and/or transmission of the computer readable code.
- The computer readable code can be recorded/transferred on a medium in a variety of ways, and examples of the medium including recording media, such as magnetic storage media (e.g. ROM, a floppy disk, a hard disk or the like and optical recording media, (e.g. a CD-ROM or a DVD), and transmission media such as media carrying or including carrier waves, as well as elements of the Internet. Thus, the medium may be such a defined and measurable structure including or carrying a signal or information, such as a device carrying a bitstream according to one or more embodiments. The media may also be a distributed network, so that the computer readable code is stored/transferred and executed in a distributed fashion. Furthermore, the processing element could include a processor or a computer processor, and processing elements may be distributed and/or included in a single device.
- As described above, according to the one or more of the above embodiments, health information of a user can be safely transmitted to a designated health care server. An encryption key and a decryption key issued by a security key issuing device are transmitted to a user terminal and the health care server by using local communication, thereby safely distributing the encryption key and the decryption key. The user terminal and the health care server encrypt and decrypt the health information of the user by using an encryption key and a decryption key and the encrypted information is transmitted through a public network such as the Internet, whereby secure communication between the user terminal and the health care server can be continuously guaranteed. Moreover, in spite of hacking of transmission of information, the information has been encrypted and personal information of the user is not included in the transmitted information by using mapping tables stored in the server, thereby guaranteeing security in information transmission.
- It should be understood that the exemplary embodiments described herein should be considered in a descriptive sense only and not for purposes of limitation. Descriptions of features, advantages or aspects within each embodiment should be considered as available for other similar features, advantages or aspects in other embodiments.
Claims (26)
1. A method of securely communicating between a user terminal and a health care server, the method comprising:
receiving an encryption key from a security key issuing device through a local communication between a user terminal and the security key issuing device;
obtaining health information of a user;
encrypting the health information by using the encryption key; and
transmitting the encrypted health information to a health care server through a network communication between the user terminal and the health care server.
2. The method of claim 1 , further comprising:
receiving a decryption key from the security key issuing device through the local communication between the user terminal and the security key issuing device; and
decrypting the encrypted health information received from the health care server by using the decryption key.
3. The method of claim 2 , wherein the receiving an encryption key further comprises receiving the encryption key through a local network, which directly connects the user terminal with the security key issuing device, and
the receiving a decryption key further comprises receiving the decryption key through a local network, which directly connects the user terminal with the security key issuing device.
4. The method of claim 2 , wherein the receiving an encryption key further comprises receiving the encryption key by reading the encryption key from a portable storage medium, which is connected to the user terminal, and
the receiving a decryption key further comprises receiving the decryption key by reading the decryption key from a portable storage medium, which is connected to the user terminal, and
the portable storage medium, when connected to the security key issuing device, stores at least one of the encryption key and the decryption key, which are read from the security key issuing device.
5. The method of claim 2 , wherein the transmitting to the health care server further comprises transmitting the encrypted health information through an internet, which is connected to the user terminal.
6. The method of claim 2 , wherein the encrypting the health information further comprises encrypting the encrypted health information by using at least one of a medium access control address of the user terminal and a medium access control address of the health care server, and
the decrypting the encrypted health information further comprises decrypting the decrypted health information by using at least one of a medium access control address of the user terminal and a medium access control address of the health care server.
7. A method of securely communicating between a health care server and a user terminal, the method comprising:
receiving a decryption key from a security key issuing device through a local communication between a health care server and the security key issuing device;
receiving encrypted information through a network communication between the health care server and a user terminal; and
decrypting the encrypted information by using the decryption key.
8. The method of claim 7 , further comprising:
receiving an encryption key from the security key issuing device through a local communication between the health care server and the security key issuing device; and
encrypting information to be transmitted to the user terminal by using the encryption key.
9. The method of claim 8 , wherein the receiving a decryption key further comprises receiving the decryption key through a local network, which directly connects the health care server with the security key issuing device, and
the receiving an encryption key further comprises receiving the encryption key through a local network, which directly connects the health care server with the security key issuing device.
10. The method of claim 8 , wherein the receiving a decryption key further comprises receiving the decryption key by reading the decryption key from a portable storage medium, which is connected to the health care server, and
the receiving an encryption key further comprises receiving the encryption key by reading the encryption key from a portable storage medium, which is connected to the health care server, and
the portable storage medium, when connected to the security key issuing device, stores at least one of the encryption key and the decryption key, which are read from the security key issuing device.
11. The method of claim 8 , wherein the receiving encrypted information further comprises receiving the encrypted information through an internet, which is connected to the health care server.
12. The method of claim 8 , wherein the decrypting the encrypted information further comprises decrypting the decrypted information by using at least one of a medium access control address of the user terminal and a medium access control address of the health care server, and
the encrypting information further comprises encrypting the encrypted information by using at least one of a medium access control address of the user terminal and a medium access control address of the health care server.
13. A method of securely communicating between a user terminal and a health care server, the method comprising:
transmitting an encryption key and a decryption key, which are issued by a security key issuing device to a user terminal and a health care server;
encrypting health information of a user by using the encryption key, wherein the encrypting is performed in the user terminal;
adding a unique identifier of the user to the encrypted health information;
transmitting the unique identifier to the health care server through a network communication;
decrypting the unique identifier by using the decryption key, wherein the decrypting is performed in the health care server; and
recognizing personal information of the user by using the unique identifier.
14. A computer-readable recording medium having recorded thereon a program for executing a method of any one of claims 1 on a computer.
15. A user terminal, comprising:
a health information obtaining unit, which obtains health information of a user;
a local communicating unit, which receives an encryption key through a local communication between a user terminal and a security key issuing device;
a security key obtaining unit, which obtains the encryption key;
an encrypting unit, which encrypts the health information by using the encryption key; and
a network communicating unit, which transmits the encrypted health information to a health care server through a network communication.
16. The user terminal of claim 15 , wherein the local communicating unit receives a decryption key through a local communication between the user terminal and the security key issuing device, and
the security key obtaining unit obtains the decryption key.
17. The user terminal of claim 16 , wherein the local communicating unit reads at least one of an encryption key and a decryption key, which are stored in a portable storage medium, and
the security key obtaining unit obtains the at least one key read by the local communicating unit.
18. The user terminal of claim 17 , wherein the network communicating unit receives encrypted information from the health care server through a network communication.
19. The user terminal of claim 18 , further comprising a decrypting unit decrypting the encrypted information received from the health care server by using the decryption key.
20. A health care server system comprising:
a local communicating unit, which receives a decryption key through a local communication between a health care server and a security key issuing device;
a security key obtaining unit, which obtains the decryption key;
a network communicating unit, which receives encrypted information from a user terminal through a network communication; and
a decrypting unit, which decrypts the encrypted information by using the decryption key.
21. The health care server system of claim 20 , wherein the local communicating unit receives an encryption key through local communication between the health care server and the security key issuing device, and
the security key obtaining unit obtains the encryption key.
22. The health care server of claim 21 , wherein the local communicating unit reads at least one of an encryption key and a decryption key, which are stored in a portable storage medium, and
the security key obtaining unit obtains the read key.
23. The health care server of claim 22 , further comprising an encrypting unit encrypting information to be transmitted to a user by using the encryption key.
24. The health care server of claim 23 , wherein the network communicating unit transmits the encrypted information to the user through a network communication.
25. A security key issuing device for secure communication between a user terminal and a health care server, the security key issuing device comprising:
a security key issuing unit, which issues at least one of an encryption key and a decryption key in response to a request from a healthcare service provider or a user;
a security key storage unit, which stores the encryption key and the decryption key together with user information of a user terminal; and
a security key transmitting unit, which transmits the encryption key and the decryption key to the user terminal and a health care server through a local communication.
26. The security key issuing device of claim 25 , further comprising a security key recording unit recording the encryption key and the decryption key onto a portable storage medium.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020080111217A KR20100052271A (en) | 2008-11-10 | 2008-11-10 | Method and apparatus of communication security for personal health information |
| KR10-2008-0111217 | 2008-11-10 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20100122083A1 true US20100122083A1 (en) | 2010-05-13 |
Family
ID=42166260
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/613,040 Abandoned US20100122083A1 (en) | 2008-11-10 | 2009-11-05 | Method and apparatus for securely communicating personal health information |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US20100122083A1 (en) |
| KR (1) | KR20100052271A (en) |
Cited By (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8990250B1 (en) * | 2011-10-11 | 2015-03-24 | 23Andme, Inc. | Cohort selection with privacy protection |
| US20150310582A1 (en) * | 2012-11-19 | 2015-10-29 | Universite De Nice | Method, system and computer program product for processing multi-dimensional digital data |
| US20160099935A1 (en) * | 2014-10-01 | 2016-04-07 | VYRTY Corporation | Secure access to individual information |
| US9641400B2 (en) | 2014-11-21 | 2017-05-02 | Afero, Inc. | Internet of things device for registering user selections |
| US9699814B2 (en) | 2015-07-03 | 2017-07-04 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IoT) system |
| US9704318B2 (en) | 2015-03-30 | 2017-07-11 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
| US20170208432A1 (en) * | 2014-12-18 | 2017-07-20 | Afero, Inc. | System and method for securely connecting network devices using optical labels |
| US9717012B2 (en) | 2015-06-01 | 2017-07-25 | Afero, Inc. | Internet of things (IOT) automotive device, system, and method |
| US9729528B2 (en) | 2015-07-03 | 2017-08-08 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IOT) system |
| KR20170097143A (en) * | 2014-12-18 | 2017-08-25 | 어페로, 인크. | Internet of things platforms, apparatuses, and methods |
| US9793937B2 (en) | 2015-10-30 | 2017-10-17 | Afero, Inc. | Apparatus and method for filtering wireless signals |
| US9832173B2 (en) * | 2014-12-18 | 2017-11-28 | Afero, Inc. | System and method for securely connecting network devices |
| US9852309B2 (en) * | 2016-01-05 | 2017-12-26 | Prifender Ltd. | System and method for securing personal data elements |
| US9942051B1 (en) | 2013-03-15 | 2018-04-10 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
| US10015766B2 (en) | 2015-07-14 | 2018-07-03 | Afero, Inc. | Apparatus and method for securely tracking event attendees using IOT devices |
| US10045150B2 (en) | 2015-03-30 | 2018-08-07 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
| US10178530B2 (en) | 2015-12-14 | 2019-01-08 | Afero, Inc. | System and method for performing asset and crowd tracking in an IoT system |
| US10263959B2 (en) * | 2014-11-28 | 2019-04-16 | Samsung Electronics Co., Ltd. | Method for communicating medical data |
| US10291595B2 (en) * | 2014-12-18 | 2019-05-14 | Afero, Inc. | System and method for securely connecting network devices |
| US10614236B2 (en) * | 2017-03-01 | 2020-04-07 | International Business Machines Corporation | Self-contained consistent data masking |
| CN111107529A (en) * | 2019-11-21 | 2020-05-05 | 广东健康在线信息技术股份有限公司 | Physical examination data transmission and storage method |
| CN111787012A (en) * | 2014-11-07 | 2020-10-16 | 三星电子株式会社 | Speech signal processing method and terminal and server for realizing the same |
| CN112100656A (en) * | 2020-09-10 | 2020-12-18 | 北京聚农科技有限公司 | Distributed health data encryption storage system |
| US10893027B2 (en) | 2016-05-26 | 2021-01-12 | VYRTY Corporation | Secure access to individual information |
| US11308936B2 (en) * | 2014-11-07 | 2022-04-19 | Samsung Electronics Co., Ltd. | Speech signal processing method and speech signal processing apparatus |
| US11343330B2 (en) | 2018-04-18 | 2022-05-24 | VYRTY Corporation | Secure access to individual information |
| CN114842981A (en) * | 2022-04-24 | 2022-08-02 | 支付宝(杭州)信息技术有限公司 | Health data reporting and health data inquiring method and device |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101398902B1 (en) * | 2011-11-11 | 2014-07-01 | 주식회사 아이센스 | encryption data transfering method of Wireless Module Embedded Blood Glucose Test Meter and system using thereof |
| WO2013100547A1 (en) * | 2011-12-28 | 2013-07-04 | 삼성전자 주식회사 | Method and apparatus for managing personal health |
| KR20140111109A (en) * | 2013-03-06 | 2014-09-18 | 주식회사 아이센스 | Blood glucose measuring apparatus transmitting encrypted blood glucose information with NFC |
| KR102452184B1 (en) * | 2014-11-28 | 2022-10-06 | 삼성전자주식회사 | Method for communicating medical data |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070005974A1 (en) * | 2005-06-29 | 2007-01-04 | Fujitsu Limited | Method for transferring encrypted data and information processing system |
| US20080222042A1 (en) * | 2004-12-03 | 2008-09-11 | Stephen James Moore | Prescription Generation Validation And Tracking |
| US20090083544A1 (en) * | 2007-08-23 | 2009-03-26 | Andrew Scholnick | Security process for private data storage and sharing |
| US20090099967A1 (en) * | 2007-10-12 | 2009-04-16 | Kaoru Yokota | Health care system, key management server and method for managing key, and encrypting device and method for encrypting vital sign data |
| US20090112882A1 (en) * | 2007-10-30 | 2009-04-30 | Guy Maresh | Methods, systems, and devices for managing medical images and records |
| US20100030690A1 (en) * | 2008-07-31 | 2010-02-04 | General Electric Company | Systems and methods for patient-controlled, encrypted, consolidated medical records |
-
2008
- 2008-11-10 KR KR1020080111217A patent/KR20100052271A/en not_active Ceased
-
2009
- 2009-11-05 US US12/613,040 patent/US20100122083A1/en not_active Abandoned
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080222042A1 (en) * | 2004-12-03 | 2008-09-11 | Stephen James Moore | Prescription Generation Validation And Tracking |
| US20070005974A1 (en) * | 2005-06-29 | 2007-01-04 | Fujitsu Limited | Method for transferring encrypted data and information processing system |
| US20090083544A1 (en) * | 2007-08-23 | 2009-03-26 | Andrew Scholnick | Security process for private data storage and sharing |
| US20090099967A1 (en) * | 2007-10-12 | 2009-04-16 | Kaoru Yokota | Health care system, key management server and method for managing key, and encrypting device and method for encrypting vital sign data |
| US20090112882A1 (en) * | 2007-10-30 | 2009-04-30 | Guy Maresh | Methods, systems, and devices for managing medical images and records |
| US20100030690A1 (en) * | 2008-07-31 | 2010-02-04 | General Electric Company | Systems and methods for patient-controlled, encrypted, consolidated medical records |
Cited By (49)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10891317B1 (en) | 2011-10-11 | 2021-01-12 | 23Andme, Inc. | Cohort selection with privacy protection |
| US20150227610A1 (en) * | 2011-10-11 | 2015-08-13 | 23Andme, Inc. | Cohort selection with privacy protection |
| US8990250B1 (en) * | 2011-10-11 | 2015-03-24 | 23Andme, Inc. | Cohort selection with privacy protection |
| US10162880B1 (en) | 2011-10-11 | 2018-12-25 | 23Andme, Inc. | Cohort selection with privacy protection |
| US9405818B2 (en) * | 2011-10-11 | 2016-08-02 | 23Andme, Inc. | Cohort selection with privacy protection |
| US11748383B1 (en) | 2011-10-11 | 2023-09-05 | 23Andme, Inc. | Cohort selection with privacy protection |
| US20150310582A1 (en) * | 2012-11-19 | 2015-10-29 | Universite De Nice | Method, system and computer program product for processing multi-dimensional digital data |
| US12225141B2 (en) | 2013-03-15 | 2025-02-11 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
| US11588650B2 (en) | 2013-03-15 | 2023-02-21 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
| US10841104B2 (en) | 2013-03-15 | 2020-11-17 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
| US10305695B1 (en) | 2013-03-15 | 2019-05-28 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
| US11930126B2 (en) | 2013-03-15 | 2024-03-12 | Piltorak Technologies LLC | System and method for secure relayed communications from an implantable medical device |
| US9942051B1 (en) | 2013-03-15 | 2018-04-10 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
| US10114977B2 (en) * | 2014-10-01 | 2018-10-30 | VYRTY Corporation | Secure access to individual information |
| US9613226B2 (en) * | 2014-10-01 | 2017-04-04 | VYRTY Corporation | Secure access to individual information |
| US11087021B2 (en) | 2014-10-01 | 2021-08-10 | VYRTY Corporation | Secure access to individual information |
| US20160099935A1 (en) * | 2014-10-01 | 2016-04-07 | VYRTY Corporation | Secure access to individual information |
| US9817998B2 (en) * | 2014-10-01 | 2017-11-14 | VYRTY Corporation | Secure access to individual information |
| WO2016054453A1 (en) * | 2014-10-01 | 2016-04-07 | VYRTY Corporation | Secure access to individual information |
| US20170161518A1 (en) * | 2014-10-01 | 2017-06-08 | VYRTY Corporation | Secure access to individual information |
| CN107004051A (en) * | 2014-10-01 | 2017-08-01 | 沃迪公司 | The secure access of individual information |
| US10579824B2 (en) * | 2014-10-01 | 2020-03-03 | VYRTY Corporation | Secure access to individual information |
| US11308936B2 (en) * | 2014-11-07 | 2022-04-19 | Samsung Electronics Co., Ltd. | Speech signal processing method and speech signal processing apparatus |
| CN111787012A (en) * | 2014-11-07 | 2020-10-16 | 三星电子株式会社 | Speech signal processing method and terminal and server for realizing the same |
| US9641400B2 (en) | 2014-11-21 | 2017-05-02 | Afero, Inc. | Internet of things device for registering user selections |
| US10263959B2 (en) * | 2014-11-28 | 2019-04-16 | Samsung Electronics Co., Ltd. | Method for communicating medical data |
| US9894473B2 (en) * | 2014-12-18 | 2018-02-13 | Afero, Inc. | System and method for securely connecting network devices using optical labels |
| US20170208432A1 (en) * | 2014-12-18 | 2017-07-20 | Afero, Inc. | System and method for securely connecting network devices using optical labels |
| US10291595B2 (en) * | 2014-12-18 | 2019-05-14 | Afero, Inc. | System and method for securely connecting network devices |
| KR102520088B1 (en) | 2014-12-18 | 2023-04-07 | 어페로, 인크. | Internet of things platforms, apparatuses, and methods |
| US9832173B2 (en) * | 2014-12-18 | 2017-11-28 | Afero, Inc. | System and method for securely connecting network devices |
| KR20170097143A (en) * | 2014-12-18 | 2017-08-25 | 어페로, 인크. | Internet of things platforms, apparatuses, and methods |
| US9704318B2 (en) | 2015-03-30 | 2017-07-11 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
| US10045150B2 (en) | 2015-03-30 | 2018-08-07 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
| US10798523B2 (en) | 2015-03-30 | 2020-10-06 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
| US9717012B2 (en) | 2015-06-01 | 2017-07-25 | Afero, Inc. | Internet of things (IOT) automotive device, system, and method |
| US10375044B2 (en) | 2015-07-03 | 2019-08-06 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IoT) system |
| US9729528B2 (en) | 2015-07-03 | 2017-08-08 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IOT) system |
| US9699814B2 (en) | 2015-07-03 | 2017-07-04 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IoT) system |
| US10015766B2 (en) | 2015-07-14 | 2018-07-03 | Afero, Inc. | Apparatus and method for securely tracking event attendees using IOT devices |
| US9793937B2 (en) | 2015-10-30 | 2017-10-17 | Afero, Inc. | Apparatus and method for filtering wireless signals |
| US10178530B2 (en) | 2015-12-14 | 2019-01-08 | Afero, Inc. | System and method for performing asset and crowd tracking in an IoT system |
| US9852309B2 (en) * | 2016-01-05 | 2017-12-26 | Prifender Ltd. | System and method for securing personal data elements |
| US10893027B2 (en) | 2016-05-26 | 2021-01-12 | VYRTY Corporation | Secure access to individual information |
| US10614236B2 (en) * | 2017-03-01 | 2020-04-07 | International Business Machines Corporation | Self-contained consistent data masking |
| US11343330B2 (en) | 2018-04-18 | 2022-05-24 | VYRTY Corporation | Secure access to individual information |
| CN111107529A (en) * | 2019-11-21 | 2020-05-05 | 广东健康在线信息技术股份有限公司 | Physical examination data transmission and storage method |
| CN112100656A (en) * | 2020-09-10 | 2020-12-18 | 北京聚农科技有限公司 | Distributed health data encryption storage system |
| CN114842981A (en) * | 2022-04-24 | 2022-08-02 | 支付宝(杭州)信息技术有限公司 | Health data reporting and health data inquiring method and device |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20100052271A (en) | 2010-05-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20100122083A1 (en) | Method and apparatus for securely communicating personal health information | |
| US12126601B2 (en) | Homomorphic encryption in a healthcare network environment, system and methods | |
| Pramanik et al. | Security and privacy in remote healthcare: Issues, solutions, and standards | |
| Thilakanathan et al. | A platform for secure monitoring and sharing of generic health data in the Cloud | |
| JP5112812B2 (en) | Telemedicine system | |
| US7774852B2 (en) | Health care system, key management server and method for managing key, and encrypting device and method for encrypting vital sign data | |
| Alanazi et al. | Meeting the security requirements of electronic medical records in the ERA of high-speed computing | |
| US9152816B2 (en) | Method of managing medical information in operating system for medical information database | |
| CN105190636A (en) | Genetic information storage device, genetic information search device, genetic information storage program, genetic information search program, genetic information storage method, genetic information search method, and genetic information search system | |
| KR101022213B1 (en) | Method and apparatus for sharing and secondary use of medical data based on multi-proxy re-encryption | |
| US10263959B2 (en) | Method for communicating medical data | |
| WO2019058952A1 (en) | Medical data search system, medical data search method, and medical data search program | |
| JP6677653B2 (en) | Control device, analysis device and decoding device | |
| US8638938B2 (en) | Symmetric key subscription | |
| Guan et al. | Achieving secure and efficient data access control for cloud-integrated body sensor networks | |
| US20110145016A1 (en) | Secure data card | |
| CN109801688A (en) | The safe synergism action system and method for area medical electronic health record | |
| Verma et al. | Secure authentication in IoT based healthcare management environment using integrated fog computing enabled blockchain system | |
| Rubio et al. | A robust and simple security extension for the medical standard SCP-ECG | |
| Omotosho et al. | Securing private keys in electronic health records using session-based hierarchical key encryption | |
| JP7686269B2 (en) | Information processing system, information processing method, and information processing program | |
| Anjikumar et al. | Secure data communication in WSHN using EXP-MD5 and DHSK-ECC | |
| KR20180111484A (en) | Method and apparatus for managing of medical record | |
| US20100122087A1 (en) | Method and apparatus for logging in a health information tele-monitoring device by using a personal portable device | |
| Kizhuvettil et al. | Medi Messenger: Secure E-Healthcare App Built with Hybrid Encryption Schema |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: SAMSUNG ELECTRONCIS CO., LTD.,KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LEE, KWANG-HYEON;YOO, KYU-TAE;REEL/FRAME:023996/0035 Effective date: 20091030 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |